file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 66) 09:31:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 81) 09:31:36 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e", 0xd3, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:31:36 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0045878, &(0x7f00000004c0)=0x10000100000) 09:31:36 executing program 3: chroot(&(0x7f0000000000)='./file0\x00') mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x8) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400081, 0x40) 09:31:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:31:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 70) [ 2362.171174] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2362.184082] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2362.209614] FAULT_INJECTION: forcing a failure. [ 2362.209614] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.211545] CPU: 0 PID: 11114 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2362.212648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.213962] Call Trace: [ 2362.214383] dump_stack+0x107/0x167 [ 2362.214966] should_fail.cold+0x5/0xa [ 2362.215551] ? create_object.isra.0+0x3a/0xa20 [ 2362.216251] should_failslab+0x5/0x20 [ 2362.216833] kmem_cache_alloc+0x5b/0x310 [ 2362.217474] create_object.isra.0+0x3a/0xa20 [ 2362.218178] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2362.218960] kmem_cache_alloc+0x159/0x310 [ 2362.219597] alloc_buffer_head+0x20/0x110 [ 2362.220261] alloc_page_buffers+0x14d/0x700 [ 2362.220972] create_empty_buffers+0x2c/0x640 [ 2362.221583] FAULT_INJECTION: forcing a failure. [ 2362.221583] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.221633] ? start_this_handle+0xfdd/0x1390 [ 2362.223964] ? start_this_handle+0xd57/0x1390 [ 2362.224647] create_page_buffers+0x1bb/0x230 [ 2362.225349] __block_write_begin_int+0x1d1/0x19c0 [ 2362.226113] ? ext4_da_release_space+0x480/0x480 [ 2362.226835] ? kmem_cache_alloc+0x2a6/0x310 [ 2362.227502] ? remove_inode_buffers+0x300/0x300 [ 2362.228225] ? jbd2__journal_start+0xf3/0x7e0 [ 2362.228928] ext4_da_write_begin+0x37d/0xd40 [ 2362.229615] ? ext4_write_begin+0x10f0/0x10f0 [ 2362.230310] ? copyout_mc+0x140/0x140 [ 2362.230906] generic_perform_write+0x20a/0x4f0 [ 2362.231612] ? page_cache_prev_miss+0x310/0x310 [ 2362.232343] ? down_write_killable+0x180/0x180 [ 2362.233063] ext4_buffered_write_iter+0x232/0x4a0 [ 2362.233809] ext4_file_write_iter+0xc11/0x18d0 [ 2362.234526] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2362.235245] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2362.236057] new_sync_write+0x42c/0x660 [ 2362.236641] ? new_sync_read+0x6f0/0x6f0 [ 2362.237287] ? ksys_write+0x12d/0x260 [ 2362.237872] ? lock_release+0x680/0x680 [ 2362.238480] ? selinux_file_permission+0x92/0x520 [ 2362.239233] ? __fget_files+0x296/0x4c0 [ 2362.239848] vfs_write+0x747/0xa70 [ 2362.240401] ksys_write+0x12d/0x260 [ 2362.240966] ? __ia32_sys_read+0xb0/0xb0 [ 2362.241589] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.242388] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.243152] do_syscall_64+0x33/0x40 [ 2362.243709] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2362.244493] RIP: 0033:0x7fcf10a65b19 [ 2362.245076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.247869] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2362.249032] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2362.250129] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2362.251216] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.252296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.253387] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2362.254505] CPU: 1 PID: 11119 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2362.255549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.256786] Call Trace: [ 2362.257195] dump_stack+0x107/0x167 [ 2362.257750] should_fail.cold+0x5/0xa [ 2362.258321] ? create_object.isra.0+0x3a/0xa20 [ 2362.259013] should_failslab+0x5/0x20 [ 2362.259590] kmem_cache_alloc+0x5b/0x310 [ 2362.260206] ? lru_cache_add+0x45c/0x800 [ 2362.260822] create_object.isra.0+0x3a/0xa20 [ 2362.261493] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2362.262254] kmem_cache_alloc+0x159/0x310 [ 2362.262892] jbd2__journal_start+0x190/0x7e0 [ 2362.263567] __ext4_journal_start_sb+0x214/0x390 [ 2362.264298] ext4_da_write_begin+0x51f/0xd40 [ 2362.264981] ? ext4_write_begin+0x10f0/0x10f0 [ 2362.265654] ? copyout_mc+0x140/0x140 [ 2362.266246] generic_perform_write+0x20a/0x4f0 [ 2362.266939] ? page_cache_prev_miss+0x310/0x310 [ 2362.267640] ? down_write_killable+0x180/0x180 [ 2362.268175] FAULT_INJECTION: forcing a failure. [ 2362.268175] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2362.268339] ext4_buffered_write_iter+0x232/0x4a0 [ 2362.270730] ext4_file_write_iter+0xc11/0x18d0 [ 2362.271435] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2362.272130] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2362.272923] new_sync_write+0x42c/0x660 [ 2362.273530] ? new_sync_read+0x6f0/0x6f0 [ 2362.274144] ? ksys_write+0x12d/0x260 [ 2362.274719] ? lock_release+0x680/0x680 [ 2362.275320] ? selinux_file_permission+0x92/0x520 [ 2362.276049] ? __fget_files+0x296/0x4c0 [ 2362.276655] vfs_write+0x747/0xa70 [ 2362.277211] ksys_write+0x12d/0x260 [ 2362.277743] ? __ia32_sys_read+0xb0/0xb0 [ 2362.278363] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.279150] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.279929] do_syscall_64+0x33/0x40 [ 2362.280487] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2362.281265] RIP: 0033:0x7f8c54bcdb19 [ 2362.281822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.284549] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2362.285690] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2362.286749] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2362.287808] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.288866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.289941] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2362.291040] CPU: 0 PID: 11115 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2362.292099] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.293349] Call Trace: [ 2362.293748] dump_stack+0x107/0x167 [ 2362.294310] should_fail.cold+0x5/0xa [ 2362.294893] __alloc_pages_nodemask+0x182/0x600 [ 2362.295598] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2362.296497] ? find_get_entry+0x2c8/0x740 [ 2362.297117] ? vmacache_find+0x55/0x2a0 [ 2362.297729] alloc_pages_current+0x187/0x280 [ 2362.298393] __page_cache_alloc+0x2d2/0x360 [ 2362.299040] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.299831] pagecache_get_page+0x2c7/0xc80 [ 2362.300476] ? asm_exc_page_fault+0x1e/0x30 [ 2362.301131] grab_cache_page_write_begin+0x64/0xa0 [ 2362.301879] ext4_da_write_begin+0x2f3/0xd40 [ 2362.302550] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2362.303501] ? ext4_write_begin+0x10f0/0x10f0 [ 2362.304165] ? copyout_mc+0x140/0x140 [ 2362.304743] generic_perform_write+0x20a/0x4f0 [ 2362.305445] ? page_cache_prev_miss+0x310/0x310 [ 2362.306141] ? down_write_killable+0x180/0x180 [ 2362.306832] ext4_buffered_write_iter+0x232/0x4a0 [ 2362.307570] ext4_file_write_iter+0xc11/0x18d0 [ 2362.308289] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2362.308975] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2362.309788] new_sync_write+0x42c/0x660 [ 2362.310386] ? new_sync_read+0x6f0/0x6f0 [ 2362.310995] ? ksys_write+0x12d/0x260 [ 2362.311571] ? lock_release+0x680/0x680 [ 2362.312166] ? selinux_file_permission+0x92/0x520 [ 2362.312912] ? __fget_files+0x296/0x4c0 [ 2362.313528] vfs_write+0x747/0xa70 [ 2362.314069] ksys_write+0x12d/0x260 [ 2362.314613] ? __ia32_sys_read+0xb0/0xb0 [ 2362.315226] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.316027] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.316805] do_syscall_64+0x33/0x40 [ 2362.317382] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2362.318148] RIP: 0033:0x7f0fd57bab19 [ 2362.318702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.321447] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2362.322573] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2362.323630] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2362.324688] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.325843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.326894] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 [ 2362.332478] FAULT_INJECTION: forcing a failure. [ 2362.332478] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.334567] CPU: 0 PID: 11116 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2362.335602] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.336831] Call Trace: 09:31:36 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0046686, &(0x7f00000004c0)=0x10000100000) [ 2362.337245] dump_stack+0x107/0x167 [ 2362.337972] should_fail.cold+0x5/0xa [ 2362.338550] ? create_object.isra.0+0x3a/0xa20 [ 2362.339233] should_failslab+0x5/0x20 [ 2362.339826] kmem_cache_alloc+0x5b/0x310 [ 2362.340449] create_object.isra.0+0x3a/0xa20 [ 2362.341106] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2362.341934] kmem_cache_alloc+0x159/0x310 [ 2362.342560] alloc_buffer_head+0x20/0x110 [ 2362.343191] alloc_page_buffers+0x14d/0x700 [ 2362.343844] create_empty_buffers+0x2c/0x640 [ 2362.344509] ? start_this_handle+0xfdd/0x1390 [ 2362.345208] ? start_this_handle+0xd57/0x1390 [ 2362.345883] create_page_buffers+0x1bb/0x230 [ 2362.346546] __block_write_begin_int+0x1d1/0x19c0 [ 2362.347273] ? ext4_da_release_space+0x480/0x480 [ 2362.347985] ? kmem_cache_alloc+0x2a6/0x310 [ 2362.348635] ? remove_inode_buffers+0x300/0x300 [ 2362.349337] ? jbd2__journal_start+0xf3/0x7e0 [ 2362.350025] ext4_da_write_begin+0x37d/0xd40 [ 2362.350704] ? ext4_write_begin+0x10f0/0x10f0 [ 2362.351385] ? copyout_mc+0x140/0x140 [ 2362.351977] generic_perform_write+0x20a/0x4f0 [ 2362.352671] ? page_cache_prev_miss+0x310/0x310 [ 2362.353382] ? down_write_killable+0x180/0x180 [ 2362.354079] ext4_buffered_write_iter+0x232/0x4a0 [ 2362.354812] ext4_file_write_iter+0xc11/0x18d0 [ 2362.355532] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2362.356232] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2362.356997] new_sync_write+0x42c/0x660 [ 2362.357609] ? new_sync_read+0x6f0/0x6f0 [ 2362.358219] ? ksys_write+0x12d/0x260 [ 2362.358804] ? lock_release+0x680/0x680 [ 2362.359399] ? selinux_file_permission+0x92/0x520 [ 2362.360156] ? __fget_files+0x296/0x4c0 [ 2362.360766] vfs_write+0x747/0xa70 [ 2362.361303] ksys_write+0x12d/0x260 [ 2362.361855] ? __ia32_sys_read+0xb0/0xb0 [ 2362.362466] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.363246] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.364019] do_syscall_64+0x33/0x40 [ 2362.364576] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2362.365362] RIP: 0033:0x7f1b43d12b19 [ 2362.365926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.368636] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2362.369780] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2362.370846] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2362.371907] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.372966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.374056] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:31:36 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0096616, &(0x7f00000004c0)=0x10000100000) 09:31:36 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) mq_timedsend(r1, &(0x7f0000000040)="7b202b516b43bbfb6846fae15eaf0db24d604d7d704554b2ff8151b7142ebdcb2f6374070c1d99bed7d805efc616f456dc0e57a225b8510c71398f88e7985538f9eb09fb115788a343955bc25b7a22c289d023241b83dfd9820193ba55b169921c793dfa67ec6a2dcff6c4ac", 0x6c, 0x5, &(0x7f00000000c0)) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r3, 0x0, r2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000140)) 09:31:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 82) 09:31:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 68) 09:31:36 executing program 3: mq_open(&(0x7f0000000000)='\x10\xb6\xdec\xdc\x06Z\xa10v\x997\xa5\xbb\x149\x87\x82q\xfdt\x1c\xf6\\Ml\x10\xd2\xb4\x01\x1cP\xa1\x03\x8bv\xd4\x94w%\xf6iE\v\x8atO\x8e\xbf&\xd7H\xca \aj\x80wcwJ\xd5@\a\\}\x0f\xba\x91c\xbc0\xc6\xb6n\xbe#L\x83*\x11_\b\xe8R\a;\x1b\xcf\x91R\xb1\x1f\x90\x83=4\xa3\x1c\x85\x83XS\xe2\xefy\xc9q\x9f\xae\x02\x1e\xb9^em\x88b:ICEi\xdd\xddh\xadV\xf4b~Y\xbf\xe9wPC,\x82\xd9\x88sS\xf1\rV\x15\xc4\xf1\xd9\xa1\xf5\xc8\xc2\xcd\xd5\x87qrQ\x17\x95\x18\xb2\aU', 0x0, 0xc8, 0x0) [ 2362.532986] FAULT_INJECTION: forcing a failure. [ 2362.532986] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.534714] CPU: 1 PID: 11130 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2362.535740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.536959] Call Trace: [ 2362.537367] dump_stack+0x107/0x167 [ 2362.537914] should_fail.cold+0x5/0xa [ 2362.538483] ? jbd2__journal_start+0x190/0x7e0 [ 2362.539166] should_failslab+0x5/0x20 [ 2362.539729] kmem_cache_alloc+0x5b/0x310 [ 2362.540339] jbd2__journal_start+0x190/0x7e0 [ 2362.540999] __ext4_journal_start_sb+0x214/0x390 [ 2362.541718] ext4_da_write_begin+0x51f/0xd40 [ 2362.542391] ? ext4_write_begin+0x10f0/0x10f0 [ 2362.543052] ? copyout_mc+0x140/0x140 [ 2362.543628] generic_perform_write+0x20a/0x4f0 [ 2362.544315] ? page_cache_prev_miss+0x310/0x310 [ 2362.545008] ? down_write_killable+0x180/0x180 [ 2362.545708] ext4_buffered_write_iter+0x232/0x4a0 [ 2362.546431] ext4_file_write_iter+0xc11/0x18d0 [ 2362.547120] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2362.547798] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2362.548592] new_sync_write+0x42c/0x660 [ 2362.549184] ? new_sync_read+0x6f0/0x6f0 [ 2362.549795] ? ksys_write+0x12d/0x260 [ 2362.550370] ? lock_release+0x680/0x680 [ 2362.550962] ? selinux_file_permission+0x92/0x520 [ 2362.551687] ? __fget_files+0x296/0x4c0 [ 2362.552291] vfs_write+0x747/0xa70 [ 2362.552831] ksys_write+0x12d/0x260 [ 2362.553381] ? __ia32_sys_read+0xb0/0xb0 [ 2362.553991] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.554774] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.555539] do_syscall_64+0x33/0x40 [ 2362.556095] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2362.556852] RIP: 0033:0x7fcf10a65b19 [ 2362.557418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.560112] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2362.561251] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2362.562298] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2362.563343] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.564395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.565456] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2362.614636] FAULT_INJECTION: forcing a failure. [ 2362.614636] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2362.617078] CPU: 0 PID: 11135 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2362.618130] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.619380] Call Trace: [ 2362.619791] dump_stack+0x107/0x167 [ 2362.620352] should_fail.cold+0x5/0xa [ 2362.620933] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2362.621755] generic_perform_write+0x279/0x4f0 [ 2362.622449] ? page_cache_prev_miss+0x310/0x310 [ 2362.623179] ? down_write_killable+0x180/0x180 [ 2362.623879] ext4_buffered_write_iter+0x232/0x4a0 [ 2362.624605] ext4_file_write_iter+0xc11/0x18d0 [ 2362.625315] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2362.626009] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2362.626821] new_sync_write+0x42c/0x660 [ 2362.627426] ? new_sync_read+0x6f0/0x6f0 [ 2362.628038] ? ksys_write+0x12d/0x260 [ 2362.628614] ? lock_release+0x680/0x680 [ 2362.629226] ? selinux_file_permission+0x92/0x520 [ 2362.629965] ? __fget_files+0x296/0x4c0 [ 2362.630578] vfs_write+0x747/0xa70 [ 2362.631126] ksys_write+0x12d/0x260 [ 2362.631676] ? __ia32_sys_read+0xb0/0xb0 [ 2362.632286] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.633075] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.633866] do_syscall_64+0x33/0x40 [ 2362.634426] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2362.635189] RIP: 0033:0x7f1b43d12b19 [ 2362.635749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.638478] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2362.639612] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2362.640671] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2362.641740] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.642800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.643866] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:31:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 83) 09:31:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 67) 09:31:48 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e", 0xd3, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:31:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:31:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 71) 09:31:48 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f000005cb80)={0xfffffffffffffffe, [{}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000140)={{r3, 0x3, 0x4, 0x0, 0x3, 0xffffffff, 0x8000, 0x2, 0x8, 0x9, 0x5cb3, 0x8, 0x8, 0x6, 0x6}}) 09:31:48 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0185879, &(0x7f00000004c0)=0x10000100000) 09:31:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 69) [ 2374.629753] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2374.633293] FAULT_INJECTION: forcing a failure. [ 2374.633293] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2374.634465] CPU: 1 PID: 11159 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2374.635096] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2374.635807] Call Trace: [ 2374.636051] dump_stack+0x107/0x167 [ 2374.636378] should_fail.cold+0x5/0xa [ 2374.636724] __alloc_pages_nodemask+0x182/0x600 [ 2374.637138] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2374.637688] ? find_get_entry+0x2c8/0x740 [ 2374.638070] ? vmacache_find+0x55/0x2a0 [ 2374.638430] alloc_pages_current+0x187/0x280 [ 2374.638820] __page_cache_alloc+0x2d2/0x360 [ 2374.639209] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2374.639679] pagecache_get_page+0x2c7/0xc80 [ 2374.640057] ? asm_exc_page_fault+0x1e/0x30 [ 2374.640444] grab_cache_page_write_begin+0x64/0xa0 [ 2374.640877] ext4_da_write_begin+0x2f3/0xd40 [ 2374.641269] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2374.641742] ? ext4_write_begin+0x10f0/0x10f0 [ 2374.642144] ? copyout_mc+0x140/0x140 [ 2374.642484] generic_perform_write+0x20a/0x4f0 [ 2374.642904] ? page_cache_prev_miss+0x310/0x310 [ 2374.643318] ? down_write_killable+0x180/0x180 [ 2374.643727] ext4_buffered_write_iter+0x232/0x4a0 [ 2374.644155] ext4_file_write_iter+0xc11/0x18d0 [ 2374.644564] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2374.644965] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2374.645444] new_sync_write+0x42c/0x660 [ 2374.645799] ? new_sync_read+0x6f0/0x6f0 [ 2374.646160] ? ksys_write+0x12d/0x260 [ 2374.646496] ? lock_release+0x680/0x680 [ 2374.646846] ? selinux_file_permission+0x92/0x520 [ 2374.647278] ? __fget_files+0x296/0x4c0 [ 2374.647636] vfs_write+0x747/0xa70 [ 2374.647961] ksys_write+0x12d/0x260 [ 2374.648280] ? __ia32_sys_read+0xb0/0xb0 [ 2374.648632] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2374.649096] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2374.649561] do_syscall_64+0x33/0x40 [ 2374.649895] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2374.650343] RIP: 0033:0x7f8c54bcdb19 [ 2374.650671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2374.652265] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2374.652929] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2374.653566] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2374.654192] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2374.654811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2374.655437] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:31:48 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0189436, &(0x7f00000004c0)=0x10000100000) [ 2374.660455] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2374.675554] FAULT_INJECTION: forcing a failure. [ 2374.675554] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2374.677477] CPU: 0 PID: 11160 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2374.678538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2374.679802] Call Trace: [ 2374.680220] dump_stack+0x107/0x167 [ 2374.680784] should_fail.cold+0x5/0xa [ 2374.681387] __alloc_pages_nodemask+0x182/0x600 [ 2374.682105] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2374.683032] ? find_get_entry+0x2c8/0x740 [ 2374.683667] ? vmacache_find+0x55/0x2a0 [ 2374.684297] alloc_pages_current+0x187/0x280 [ 2374.684977] __page_cache_alloc+0x2d2/0x360 [ 2374.685652] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2374.686462] pagecache_get_page+0x2c7/0xc80 [ 2374.687141] ? asm_exc_page_fault+0x1e/0x30 [ 2374.687822] grab_cache_page_write_begin+0x64/0xa0 [ 2374.688602] ext4_da_write_begin+0x2f3/0xd40 [ 2374.689295] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2374.690134] ? ext4_write_begin+0x10f0/0x10f0 [ 2374.690828] ? copyout_mc+0x140/0x140 [ 2374.691425] generic_perform_write+0x20a/0x4f0 [ 2374.692138] ? page_cache_prev_miss+0x310/0x310 [ 2374.692858] ? down_write_killable+0x180/0x180 [ 2374.693578] ext4_buffered_write_iter+0x232/0x4a0 [ 2374.694324] ext4_file_write_iter+0xc11/0x18d0 [ 2374.695054] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2374.695781] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2374.696610] new_sync_write+0x42c/0x660 [ 2374.697241] ? new_sync_read+0x6f0/0x6f0 [ 2374.697877] ? ksys_write+0x12d/0x260 [ 2374.698479] ? lock_release+0x680/0x680 [ 2374.699106] ? selinux_file_permission+0x92/0x520 [ 2374.699872] ? __fget_files+0x296/0x4c0 [ 2374.700504] vfs_write+0x747/0xa70 [ 2374.701073] ksys_write+0x12d/0x260 [ 2374.701641] ? __ia32_sys_read+0xb0/0xb0 [ 2374.702271] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2374.703077] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2374.703869] do_syscall_64+0x33/0x40 [ 2374.704440] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2374.705233] RIP: 0033:0x7fcf10a65b19 [ 2374.705818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2374.708626] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2374.709813] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2374.710910] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2374.712008] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2374.713115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2374.714227] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2374.718365] FAULT_INJECTION: forcing a failure. [ 2374.718365] name failslab, interval 1, probability 0, space 0, times 0 [ 2374.719437] CPU: 1 PID: 11151 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2374.720044] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2374.720749] Call Trace: [ 2374.720984] dump_stack+0x107/0x167 [ 2374.721300] should_fail.cold+0x5/0xa [ 2374.721642] ? jbd2__journal_start+0x190/0x7e0 [ 2374.722032] should_failslab+0x5/0x20 [ 2374.722352] kmem_cache_alloc+0x5b/0x310 [ 2374.722703] jbd2__journal_start+0x190/0x7e0 [ 2374.723098] __ext4_journal_start_sb+0x214/0x390 [ 2374.723435] FAULT_INJECTION: forcing a failure. [ 2374.723435] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2374.723519] ext4_da_write_begin+0x51f/0xd40 [ 2374.725669] ? ext4_write_begin+0x10f0/0x10f0 [ 2374.726065] ? copyout_mc+0x140/0x140 [ 2374.726389] generic_perform_write+0x20a/0x4f0 [ 2374.726788] ? page_cache_prev_miss+0x310/0x310 [ 2374.727198] ? down_write_killable+0x180/0x180 [ 2374.727597] ext4_buffered_write_iter+0x232/0x4a0 [ 2374.728022] ext4_file_write_iter+0xc11/0x18d0 [ 2374.728420] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2374.728820] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2374.729279] new_sync_write+0x42c/0x660 [ 2374.729615] ? new_sync_read+0x6f0/0x6f0 [ 2374.729969] ? ksys_write+0x12d/0x260 [ 2374.730290] ? lock_release+0x680/0x680 [ 2374.730628] ? selinux_file_permission+0x92/0x520 [ 2374.731048] ? __fget_files+0x296/0x4c0 [ 2374.731395] vfs_write+0x747/0xa70 [ 2374.731696] ksys_write+0x12d/0x260 [ 2374.732017] ? __ia32_sys_read+0xb0/0xb0 [ 2374.732361] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2374.732820] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2374.733257] do_syscall_64+0x33/0x40 [ 2374.733596] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2374.734043] RIP: 0033:0x7f0fd57bab19 [ 2374.734359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2374.735897] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2374.736532] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2374.737126] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2374.737731] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2374.738341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2374.738943] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 [ 2374.739553] CPU: 0 PID: 11148 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2374.740631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2374.741908] Call Trace: [ 2374.742327] dump_stack+0x107/0x167 [ 2374.742897] should_fail.cold+0x5/0xa [ 2374.743498] __alloc_pages_nodemask+0x182/0x600 [ 2374.744223] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2374.745160] ? find_get_entry+0x2c8/0x740 [ 2374.745803] ? vmacache_find+0x55/0x2a0 [ 2374.746430] alloc_pages_current+0x187/0x280 [ 2374.747124] __page_cache_alloc+0x2d2/0x360 [ 2374.747797] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2374.748621] pagecache_get_page+0x2c7/0xc80 [ 2374.749287] ? asm_exc_page_fault+0x1e/0x30 [ 2374.749957] grab_cache_page_write_begin+0x64/0xa0 [ 2374.750718] ext4_da_write_begin+0x2f3/0xd40 [ 2374.751395] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2374.752202] ? ext4_write_begin+0x10f0/0x10f0 [ 2374.752897] ? copyout_mc+0x140/0x140 [ 2374.753506] generic_perform_write+0x20a/0x4f0 [ 2374.754230] ? page_cache_prev_miss+0x310/0x310 [ 2374.754947] ? down_write_killable+0x180/0x180 [ 2374.755657] ext4_buffered_write_iter+0x232/0x4a0 [ 2374.756409] ext4_file_write_iter+0xc11/0x18d0 [ 2374.757127] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2374.757847] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2374.758668] new_sync_write+0x42c/0x660 [ 2374.759291] ? new_sync_read+0x6f0/0x6f0 [ 2374.759928] ? ksys_write+0x12d/0x260 [ 2374.760499] ? lock_release+0x680/0x680 [ 2374.761108] ? selinux_file_permission+0x92/0x520 [ 2374.761873] ? __fget_files+0x296/0x4c0 [ 2374.762498] vfs_write+0x747/0xa70 [ 2374.763065] ksys_write+0x12d/0x260 [ 2374.763631] ? __ia32_sys_read+0xb0/0xb0 [ 2374.764259] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2374.765072] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2374.765879] do_syscall_64+0x33/0x40 [ 2374.766458] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2374.767263] RIP: 0033:0x7f1b43d12b19 [ 2374.767839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2374.770674] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2374.771846] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2374.772951] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2374.774064] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2374.775162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2374.776263] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:32:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 72) 09:32:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 68) 09:32:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 70) 09:32:00 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d", 0x6a, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:32:00 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc020660b, &(0x7f00000004c0)=0x10000100000) 09:32:00 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x4c, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x38, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000010) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000005200210c00000000000000000a0000008a6df8076e788e0e53d3ce8a2f075787a1096f5f3b0dc88c30aa9b409343e9757edbef0c85f026d839c6bc06fdd0efe2fb8a57cb607a418deb5dfbbad9400b29e009b2535e63da63"], 0x14}}, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f0000000240)={{0x0, 0x4}, 0x100, './file0\x00'}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x340c2, 0x0) mq_timedsend(r3, &(0x7f0000000140)="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", 0xfc, 0x19, 0x0) 09:32:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 84) 09:32:00 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2386.639433] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11183 comm=syz-executor.3 [ 2386.646323] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2386.655150] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11183 comm=syz-executor.3 [ 2386.660713] FAULT_INJECTION: forcing a failure. [ 2386.660713] name failslab, interval 1, probability 0, space 0, times 0 [ 2386.662461] CPU: 1 PID: 11187 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2386.663461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2386.664666] Call Trace: [ 2386.665068] dump_stack+0x107/0x167 [ 2386.665619] should_fail.cold+0x5/0xa [ 2386.666180] ? create_object.isra.0+0x3a/0xa20 [ 2386.666848] should_failslab+0x5/0x20 [ 2386.667413] kmem_cache_alloc+0x5b/0x310 [ 2386.668011] ? lru_cache_add+0x45c/0x800 [ 2386.668619] create_object.isra.0+0x3a/0xa20 [ 2386.669273] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2386.670016] kmem_cache_alloc+0x159/0x310 [ 2386.670629] jbd2__journal_start+0x190/0x7e0 [ 2386.670750] FAULT_INJECTION: forcing a failure. [ 2386.670750] name failslab, interval 1, probability 0, space 0, times 0 [ 2386.671280] __ext4_journal_start_sb+0x214/0x390 [ 2386.671310] ext4_da_write_begin+0x51f/0xd40 [ 2386.671344] ? ext4_write_begin+0x10f0/0x10f0 [ 2386.674895] ? copyout_mc+0x140/0x140 [ 2386.675460] generic_perform_write+0x20a/0x4f0 [ 2386.676133] ? page_cache_prev_miss+0x310/0x310 [ 2386.676807] ? down_write_killable+0x180/0x180 [ 2386.677491] ext4_buffered_write_iter+0x232/0x4a0 [ 2386.678209] ext4_file_write_iter+0xc11/0x18d0 [ 2386.678886] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2386.679555] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2386.680328] new_sync_write+0x42c/0x660 [ 2386.680915] ? new_sync_read+0x6f0/0x6f0 [ 2386.681513] ? ksys_write+0x12d/0x260 [ 2386.682080] ? lock_release+0x680/0x680 [ 2386.682659] ? selinux_file_permission+0x92/0x520 [ 2386.683367] ? __fget_files+0x296/0x4c0 [ 2386.683962] vfs_write+0x747/0xa70 [ 2386.684492] ksys_write+0x12d/0x260 [ 2386.685034] ? __ia32_sys_read+0xb0/0xb0 [ 2386.685637] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2386.686404] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2386.687161] do_syscall_64+0x33/0x40 [ 2386.687699] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2386.688447] RIP: 0033:0x7fcf10a65b19 [ 2386.688998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2386.691638] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2386.692737] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2386.693775] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2386.694805] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2386.695837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2386.696878] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2386.697981] CPU: 0 PID: 11180 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2386.699242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2386.700696] Call Trace: [ 2386.701201] dump_stack+0x107/0x167 [ 2386.701891] should_fail.cold+0x5/0xa [ 2386.702315] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2386.702604] ? jbd2__journal_start+0x190/0x7e0 [ 2386.704663] should_failslab+0x5/0x20 [ 2386.705359] kmem_cache_alloc+0x5b/0x310 [ 2386.706136] jbd2__journal_start+0x190/0x7e0 [ 2386.706959] __ext4_journal_start_sb+0x214/0x390 [ 2386.707835] ext4_da_write_begin+0x51f/0xd40 [ 2386.708656] ? ext4_write_begin+0x10f0/0x10f0 [ 2386.709454] ? copyout_mc+0x140/0x140 [ 2386.710068] generic_perform_write+0x20a/0x4f0 [ 2386.710763] ? page_cache_prev_miss+0x310/0x310 [ 2386.711454] ? down_write_killable+0x180/0x180 [ 2386.712174] ext4_buffered_write_iter+0x232/0x4a0 [ 2386.712906] ext4_file_write_iter+0xc11/0x18d0 [ 2386.713376] FAULT_INJECTION: forcing a failure. [ 2386.713376] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2386.713613] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2386.715957] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2386.716735] new_sync_write+0x42c/0x660 [ 2386.717334] ? new_sync_read+0x6f0/0x6f0 [ 2386.717947] ? ksys_write+0x12d/0x260 [ 2386.718508] ? lock_release+0x680/0x680 [ 2386.719101] ? selinux_file_permission+0x92/0x520 [ 2386.719813] ? __fget_files+0x296/0x4c0 [ 2386.720415] vfs_write+0x747/0xa70 [ 2386.720953] ksys_write+0x12d/0x260 [ 2386.721497] ? __ia32_sys_read+0xb0/0xb0 [ 2386.722109] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2386.722880] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2386.723639] do_syscall_64+0x33/0x40 [ 2386.724197] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2386.724960] RIP: 0033:0x7f1b43d12b19 [ 2386.725515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2386.728194] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2386.729308] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2386.730340] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2386.731364] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2386.732382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2386.733427] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 [ 2386.734516] CPU: 1 PID: 11179 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2386.735548] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2386.736748] Call Trace: [ 2386.737141] dump_stack+0x107/0x167 [ 2386.737687] should_fail.cold+0x5/0xa [ 2386.738254] __alloc_pages_nodemask+0x182/0x600 [ 2386.738939] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2386.739799] ? find_get_entry+0x2c8/0x740 [ 2386.740405] ? vmacache_find+0x55/0x2a0 [ 2386.740986] alloc_pages_current+0x187/0x280 [ 2386.741646] __page_cache_alloc+0x2d2/0x360 [ 2386.742275] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2386.743049] pagecache_get_page+0x2c7/0xc80 [ 2386.743682] ? asm_exc_page_fault+0x1e/0x30 [ 2386.744324] grab_cache_page_write_begin+0x64/0xa0 [ 2386.745035] ext4_da_write_begin+0x2f3/0xd40 [ 2386.745694] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2386.746447] ? ext4_write_begin+0x10f0/0x10f0 [ 2386.747124] ? copyout_mc+0x140/0x140 [ 2386.747687] generic_perform_write+0x20a/0x4f0 [ 2386.748368] ? page_cache_prev_miss+0x310/0x310 [ 2386.749042] ? down_write_killable+0x180/0x180 [ 2386.749737] ext4_buffered_write_iter+0x232/0x4a0 [ 2386.750450] ext4_file_write_iter+0xc11/0x18d0 [ 2386.751133] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2386.751802] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2386.752577] new_sync_write+0x42c/0x660 [ 2386.753156] ? new_sync_read+0x6f0/0x6f0 [ 2386.753757] ? ksys_write+0x12d/0x260 [ 2386.754309] ? lock_release+0x680/0x680 [ 2386.754891] ? selinux_file_permission+0x92/0x520 [ 2386.755593] ? __fget_files+0x296/0x4c0 [ 2386.756202] vfs_write+0x747/0xa70 [ 2386.756734] ksys_write+0x12d/0x260 [ 2386.757273] ? __ia32_sys_read+0xb0/0xb0 [ 2386.757870] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2386.758633] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2386.759384] do_syscall_64+0x33/0x40 [ 2386.759932] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2386.760666] RIP: 0033:0x7f0fd57bab19 [ 2386.761216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2386.763844] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2386.764975] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2386.766063] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2386.767153] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2386.768244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2386.769337] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 09:32:01 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc020662a, &(0x7f00000004c0)=0x10000100000) [ 2386.787696] FAULT_INJECTION: forcing a failure. [ 2386.787696] name failslab, interval 1, probability 0, space 0, times 0 [ 2386.789677] CPU: 1 PID: 11192 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2386.790748] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2386.792013] Call Trace: [ 2386.792425] dump_stack+0x107/0x167 [ 2386.792993] should_fail.cold+0x5/0xa [ 2386.793591] ? jbd2__journal_start+0x190/0x7e0 [ 2386.794302] should_failslab+0x5/0x20 [ 2386.794901] kmem_cache_alloc+0x5b/0x310 [ 2386.795536] jbd2__journal_start+0x190/0x7e0 09:32:01 executing program 3: mq_open(&(0x7f0000000000)='\xa3\x04:\xc2\x1c\xdf\"\x12\xd4\xe1\xf8|\t\x1bN_\xfa\x91cn\x18\x9b\xa3\x141\xa7\xc7\x9b\xcc\x95Q\xc1+2SI\x06\xf6\xe9\x14\f=\x99\x00\x11\x00\x00\xb3\"\x020\x01{\xd0-9\xd1\xa3\x99X\x1e:\x966\x9f\nW\xc4\x99\x17!k\xd3\x94\xb2', 0x800, 0x0, 0x0) [ 2386.796219] __ext4_journal_start_sb+0x214/0x390 [ 2386.797117] ext4_da_write_begin+0x51f/0xd40 [ 2386.797811] ? ext4_write_begin+0x10f0/0x10f0 [ 2386.798486] ? copyout_mc+0x140/0x140 [ 2386.799089] generic_perform_write+0x20a/0x4f0 [ 2386.799797] ? page_cache_prev_miss+0x310/0x310 [ 2386.800521] ? down_write_killable+0x180/0x180 [ 2386.801232] ext4_buffered_write_iter+0x232/0x4a0 [ 2386.801975] ext4_file_write_iter+0xc11/0x18d0 [ 2386.802688] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2386.803352] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2386.804172] new_sync_write+0x42c/0x660 [ 2386.804786] ? new_sync_read+0x6f0/0x6f0 [ 2386.805404] ? ksys_write+0x12d/0x260 [ 2386.805997] ? lock_release+0x680/0x680 [ 2386.806603] ? selinux_file_permission+0x92/0x520 [ 2386.807353] ? __fget_files+0x296/0x4c0 [ 2386.807972] vfs_write+0x747/0xa70 [ 2386.808519] ksys_write+0x12d/0x260 [ 2386.809081] ? __ia32_sys_read+0xb0/0xb0 [ 2386.809714] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2386.810515] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2386.811314] do_syscall_64+0x33/0x40 [ 2386.811881] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2386.812667] RIP: 0033:0x7f8c54bcdb19 [ 2386.813236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2386.816039] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2386.817197] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2386.818280] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2386.819366] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2386.820456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2386.821559] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:32:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 85) 09:32:01 executing program 3: mq_open(&(0x7f0000000000)='\x8e\xa6-)]\x00\x8cj[p\x14\x17%\xa9\xd8\xfc\xc8\xdb.j\xa8\x940\xa2\xd4\xa1\xbc\xb2\xf4\x04PC\x90m\xa1\xec\x02\x00\x00\x00\x00\x00\x00\x00:\xdd\xff\xfd\xe8\xfd,\xca\x1f', 0x80, 0x0, 0x0) 09:32:01 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc028660f, &(0x7f00000004c0)=0x10000100000) 09:32:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 73) [ 2387.001608] FAULT_INJECTION: forcing a failure. [ 2387.001608] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2387.003490] CPU: 1 PID: 11207 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2387.004522] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2387.005750] Call Trace: [ 2387.006150] dump_stack+0x107/0x167 [ 2387.006695] should_fail.cold+0x5/0xa [ 2387.007268] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2387.008070] generic_perform_write+0x279/0x4f0 [ 2387.008757] ? page_cache_prev_miss+0x310/0x310 [ 2387.009452] ? down_write_killable+0x180/0x180 [ 2387.010155] ext4_buffered_write_iter+0x232/0x4a0 [ 2387.010877] ext4_file_write_iter+0xc11/0x18d0 [ 2387.011569] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2387.012256] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2387.013035] new_sync_write+0x42c/0x660 [ 2387.013638] ? new_sync_read+0x6f0/0x6f0 [ 2387.014247] ? ksys_write+0x12d/0x260 [ 2387.014819] ? lock_release+0x680/0x680 [ 2387.015409] ? selinux_file_permission+0x92/0x520 [ 2387.016129] ? __fget_files+0x296/0x4c0 [ 2387.016730] vfs_write+0x747/0xa70 [ 2387.017274] ksys_write+0x12d/0x260 [ 2387.017818] ? __ia32_sys_read+0xb0/0xb0 [ 2387.018426] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2387.019203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2387.019967] do_syscall_64+0x33/0x40 [ 2387.020520] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2387.021276] RIP: 0033:0x7fcf10a65b19 [ 2387.021835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2387.024522] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2387.025651] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2387.026699] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2387.027751] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2387.028802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2387.029860] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 09:32:01 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2387.104657] FAULT_INJECTION: forcing a failure. [ 2387.104657] name failslab, interval 1, probability 0, space 0, times 0 [ 2387.106740] CPU: 0 PID: 11215 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2387.107762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2387.108977] Call Trace: [ 2387.109375] dump_stack+0x107/0x167 [ 2387.109929] should_fail.cold+0x5/0xa [ 2387.110498] ? jbd2__journal_start+0x190/0x7e0 [ 2387.111179] should_failslab+0x5/0x20 [ 2387.111746] kmem_cache_alloc+0x5b/0x310 [ 2387.112358] jbd2__journal_start+0x190/0x7e0 [ 2387.113022] __ext4_journal_start_sb+0x214/0x390 [ 2387.113743] ext4_da_write_begin+0x51f/0xd40 [ 2387.114412] ? ext4_write_begin+0x10f0/0x10f0 [ 2387.115079] ? copyout_mc+0x140/0x140 [ 2387.115657] generic_perform_write+0x20a/0x4f0 [ 2387.116360] ? page_cache_prev_miss+0x310/0x310 [ 2387.117047] ? down_write_killable+0x180/0x180 [ 2387.117738] ext4_buffered_write_iter+0x232/0x4a0 [ 2387.118445] ext4_file_write_iter+0xc11/0x18d0 [ 2387.119123] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2387.119795] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2387.120570] new_sync_write+0x42c/0x660 [ 2387.121152] ? new_sync_read+0x6f0/0x6f0 [ 2387.121761] ? ksys_write+0x12d/0x260 [ 2387.122319] ? lock_release+0x680/0x680 [ 2387.122898] ? selinux_file_permission+0x92/0x520 [ 2387.123597] ? __fget_files+0x296/0x4c0 [ 2387.124192] vfs_write+0x747/0xa70 [ 2387.124724] ksys_write+0x12d/0x260 [ 2387.125254] ? __ia32_sys_read+0xb0/0xb0 [ 2387.125868] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2387.126628] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2387.127383] do_syscall_64+0x33/0x40 [ 2387.127929] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2387.128669] RIP: 0033:0x7f8c54bcdb19 [ 2387.129215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2387.131869] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2387.132972] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2387.134019] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2387.135048] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2387.136082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2387.137121] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2387.159100] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2400.851673] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2400.873094] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:32:15 executing program 3: mq_open(&(0x7f0000000000)='.+-)m\x00', 0x2, 0x0, 0x0) 09:32:15 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:32:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 74) 09:32:15 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0406618, &(0x7f00000004c0)=0x10000100000) 09:32:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 71) 09:32:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 69) 09:32:15 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d", 0x6a, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:32:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 86) [ 2400.898406] FAULT_INJECTION: forcing a failure. [ 2400.898406] name failslab, interval 1, probability 0, space 0, times 0 [ 2400.900195] CPU: 1 PID: 11242 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2400.901266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2400.902551] Call Trace: [ 2400.902966] dump_stack+0x107/0x167 [ 2400.903531] should_fail.cold+0x5/0xa [ 2400.904123] ? create_object.isra.0+0x3a/0xa20 [ 2400.904841] should_failslab+0x5/0x20 [ 2400.905442] kmem_cache_alloc+0x5b/0x310 [ 2400.906091] create_object.isra.0+0x3a/0xa20 [ 2400.906772] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2400.907567] kmem_cache_alloc+0x159/0x310 [ 2400.908221] alloc_buffer_head+0x20/0x110 [ 2400.908860] alloc_page_buffers+0x14d/0x700 [ 2400.909541] create_empty_buffers+0x2c/0x640 [ 2400.910204] ? start_this_handle+0xfdd/0x1390 [ 2400.910896] ? start_this_handle+0xd57/0x1390 [ 2400.911564] create_page_buffers+0x1bb/0x230 [ 2400.912260] __block_write_begin_int+0x1d1/0x19c0 [ 2400.912974] ? ext4_da_release_space+0x480/0x480 [ 2400.913725] ? kmem_cache_alloc+0x2a6/0x310 [ 2400.914386] ? remove_inode_buffers+0x300/0x300 [ 2400.915104] ? jbd2__journal_start+0xf3/0x7e0 [ 2400.915782] ext4_da_write_begin+0x37d/0xd40 [ 2400.916488] ? ext4_write_begin+0x10f0/0x10f0 [ 2400.916685] FAULT_INJECTION: forcing a failure. [ 2400.916685] name failslab, interval 1, probability 0, space 0, times 0 [ 2400.917142] ? copyout_mc+0x140/0x140 [ 2400.917177] generic_perform_write+0x20a/0x4f0 [ 2400.917210] ? page_cache_prev_miss+0x310/0x310 [ 2400.917235] ? down_write_killable+0x180/0x180 [ 2400.917269] ext4_buffered_write_iter+0x232/0x4a0 [ 2400.917296] ext4_file_write_iter+0xc11/0x18d0 [ 2400.917333] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2400.917361] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2400.917394] new_sync_write+0x42c/0x660 [ 2400.917422] ? new_sync_read+0x6f0/0x6f0 [ 2400.925769] ? ksys_write+0x12d/0x260 [ 2400.926344] ? lock_release+0x680/0x680 [ 2400.926965] ? selinux_file_permission+0x92/0x520 [ 2400.927680] ? __fget_files+0x296/0x4c0 [ 2400.928314] vfs_write+0x747/0xa70 [ 2400.928847] ksys_write+0x12d/0x260 [ 2400.929415] ? __ia32_sys_read+0xb0/0xb0 [ 2400.930036] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2400.930844] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2400.931607] do_syscall_64+0x33/0x40 [ 2400.932191] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2400.932946] RIP: 0033:0x7fcf10a65b19 [ 2400.933521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2400.936206] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2400.937378] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2400.938483] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2400.939577] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2400.940671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2400.941776] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2400.942971] CPU: 0 PID: 11236 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2400.944115] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2400.945432] Call Trace: [ 2400.945888] dump_stack+0x107/0x167 [ 2400.946489] should_fail.cold+0x5/0xa [ 2400.947109] ? create_object.isra.0+0x3a/0xa20 [ 2400.947846] should_failslab+0x5/0x20 [ 2400.948473] kmem_cache_alloc+0x5b/0x310 [ 2400.949142] create_object.isra.0+0x3a/0xa20 [ 2400.949884] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2400.950708] kmem_cache_alloc+0x159/0x310 [ 2400.951404] alloc_buffer_head+0x20/0x110 [ 2400.952088] alloc_page_buffers+0x14d/0x700 [ 2400.952799] create_empty_buffers+0x2c/0x640 [ 2400.953515] ? start_this_handle+0xfdd/0x1390 [ 2400.954268] ? start_this_handle+0xd57/0x1390 [ 2400.955009] create_page_buffers+0x1bb/0x230 [ 2400.955751] __block_write_begin_int+0x1d1/0x19c0 [ 2400.956542] ? ext4_da_release_space+0x480/0x480 [ 2400.957306] ? kmem_cache_alloc+0x2a6/0x310 [ 2400.958033] ? remove_inode_buffers+0x300/0x300 [ 2400.958791] ? jbd2__journal_start+0xf3/0x7e0 [ 2400.959553] ext4_da_write_begin+0x37d/0xd40 [ 2400.960310] ? ext4_write_begin+0x10f0/0x10f0 [ 2400.960601] FAULT_INJECTION: forcing a failure. [ 2400.960601] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2400.961026] ? copyout_mc+0x140/0x140 [ 2400.961062] generic_perform_write+0x20a/0x4f0 [ 2400.961101] ? page_cache_prev_miss+0x310/0x310 [ 2400.961131] ? down_write_killable+0x180/0x180 [ 2400.965692] ext4_buffered_write_iter+0x232/0x4a0 [ 2400.966488] ext4_file_write_iter+0xc11/0x18d0 [ 2400.967245] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2400.968023] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2400.968877] new_sync_write+0x42c/0x660 [ 2400.969531] ? new_sync_read+0x6f0/0x6f0 [ 2400.970206] ? ksys_write+0x12d/0x260 [ 2400.970831] ? lock_release+0x680/0x680 [ 2400.971483] ? selinux_file_permission+0x92/0x520 [ 2400.972279] ? __fget_files+0x296/0x4c0 [ 2400.972941] vfs_write+0x747/0xa70 [ 2400.973532] ksys_write+0x12d/0x260 [ 2400.974139] ? __ia32_sys_read+0xb0/0xb0 [ 2400.974803] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2400.975635] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2400.976467] do_syscall_64+0x33/0x40 [ 2400.977081] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2400.977924] RIP: 0033:0x7f8c54bcdb19 [ 2400.978535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2400.981493] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2400.982716] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2400.983877] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2400.985006] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2400.986160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2400.987303] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2400.988476] CPU: 1 PID: 11239 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2400.989570] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2400.990855] Call Trace: [ 2400.991272] dump_stack+0x107/0x167 [ 2400.991845] should_fail.cold+0x5/0xa [ 2400.992440] __alloc_pages_nodemask+0x182/0x600 [ 2400.993167] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2400.994124] alloc_pages_current+0x187/0x280 [ 2400.994808] allocate_slab+0x26f/0x380 [ 2400.995417] ___slab_alloc+0x470/0x700 [ 2400.996029] ? alloc_buffer_head+0x20/0x110 [ 2400.996711] ? alloc_buffer_head+0x20/0x110 [ 2400.997350] ? kmem_cache_alloc+0x301/0x310 [ 2400.998023] kmem_cache_alloc+0x301/0x310 [ 2400.998671] alloc_buffer_head+0x20/0x110 [ 2400.999318] alloc_page_buffers+0x14d/0x700 [ 2401.000005] create_empty_buffers+0x2c/0x640 [ 2401.000683] ? start_this_handle+0xfdd/0x1390 [ 2401.001371] ? start_this_handle+0xd57/0x1390 [ 2401.002044] create_page_buffers+0x1bb/0x230 [ 2401.002735] __block_write_begin_int+0x1d1/0x19c0 [ 2401.003455] ? ext4_da_release_space+0x480/0x480 [ 2401.004200] ? kmem_cache_alloc+0x2a6/0x310 [ 2401.004843] ? remove_inode_buffers+0x300/0x300 [ 2401.005560] ? jbd2__journal_start+0xf3/0x7e0 [ 2401.006254] ext4_da_write_begin+0x37d/0xd40 09:32:15 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ptrace$peeksig(0x4209, r0, &(0x7f00000000c0)={0x5, 0x0, 0x8}, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}]) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) mq_open(&(0x7f0000000000)='{]#-#!\x00', 0x80, 0x34, &(0x7f0000000040)={0x2, 0x3, 0x8, 0x3}) [ 2401.006952] ? ext4_write_begin+0x10f0/0x10f0 [ 2401.007862] ? copyout_mc+0x140/0x140 [ 2401.008468] generic_perform_write+0x20a/0x4f0 [ 2401.009185] ? page_cache_prev_miss+0x310/0x310 [ 2401.009919] ? down_write_killable+0x180/0x180 [ 2401.010646] ext4_buffered_write_iter+0x232/0x4a0 [ 2401.011401] ext4_file_write_iter+0xc11/0x18d0 [ 2401.012089] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2401.012812] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.013641] new_sync_write+0x42c/0x660 [ 2401.014274] ? new_sync_read+0x6f0/0x6f0 [ 2401.014901] ? ksys_write+0x12d/0x260 [ 2401.015467] ? lock_release+0x680/0x680 [ 2401.016088] ? selinux_file_permission+0x92/0x520 [ 2401.016842] ? __fget_files+0x296/0x4c0 [ 2401.017473] vfs_write+0x747/0xa70 [ 2401.018021] ksys_write+0x12d/0x260 [ 2401.018565] ? __ia32_sys_read+0xb0/0xb0 [ 2401.019177] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.019946] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.020711] do_syscall_64+0x33/0x40 [ 2401.021264] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2401.022034] RIP: 0033:0x7f0fd57bab19 [ 2401.022585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.025252] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2401.026365] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2401.027393] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2401.028431] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.029470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2401.030511] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 09:32:15 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0406619, &(0x7f00000004c0)=0x10000100000) [ 2401.037458] FAULT_INJECTION: forcing a failure. [ 2401.037458] name failslab, interval 1, probability 0, space 0, times 0 [ 2401.039456] CPU: 1 PID: 11229 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2401.040454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.041638] Call Trace: [ 2401.042031] dump_stack+0x107/0x167 [ 2401.042568] should_fail.cold+0x5/0xa [ 2401.043135] ? create_object.isra.0+0x3a/0xa20 [ 2401.043797] should_failslab+0x5/0x20 [ 2401.044350] kmem_cache_alloc+0x5b/0x310 [ 2401.044946] ? lru_cache_add+0x45c/0x800 [ 2401.045540] create_object.isra.0+0x3a/0xa20 [ 2401.046195] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2401.046944] kmem_cache_alloc+0x159/0x310 [ 2401.047553] jbd2__journal_start+0x190/0x7e0 [ 2401.048199] __ext4_journal_start_sb+0x214/0x390 [ 2401.048889] ext4_da_write_begin+0x51f/0xd40 [ 2401.049548] ? ext4_write_begin+0x10f0/0x10f0 [ 2401.050207] ? copyout_mc+0x140/0x140 [ 2401.050778] generic_perform_write+0x20a/0x4f0 [ 2401.051455] ? page_cache_prev_miss+0x310/0x310 [ 2401.052131] ? down_write_killable+0x180/0x180 [ 2401.052823] ext4_buffered_write_iter+0x232/0x4a0 [ 2401.053530] ext4_file_write_iter+0xc11/0x18d0 [ 2401.054495] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2401.055304] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.056225] new_sync_write+0x42c/0x660 [ 2401.056934] ? new_sync_read+0x6f0/0x6f0 [ 2401.057643] ? ksys_write+0x12d/0x260 [ 2401.058334] ? lock_release+0x680/0x680 [ 2401.058986] ? selinux_file_permission+0x92/0x520 [ 2401.059885] ? __fget_files+0x296/0x4c0 [ 2401.060591] vfs_write+0x747/0xa70 [ 2401.061169] ksys_write+0x12d/0x260 [ 2401.061749] ? __ia32_sys_read+0xb0/0xb0 [ 2401.062387] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.063201] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.064001] do_syscall_64+0x33/0x40 [ 2401.064577] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2401.065368] RIP: 0033:0x7f1b43d12b19 [ 2401.065953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.068744] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2401.069917] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2401.071008] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2401.072100] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.073200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2401.074301] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:32:15 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x40, 0x0, 0x0) 09:32:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 87) 09:32:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 72) 09:32:15 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0506617, &(0x7f00000004c0)=0x10000100000) [ 2401.237776] FAULT_INJECTION: forcing a failure. [ 2401.237776] name failslab, interval 1, probability 0, space 0, times 0 [ 2401.239625] CPU: 0 PID: 11257 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2401.240717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.242013] Call Trace: [ 2401.242436] dump_stack+0x107/0x167 [ 2401.243010] should_fail.cold+0x5/0xa [ 2401.243609] ? jbd2__journal_start+0x190/0x7e0 [ 2401.244340] should_failslab+0x5/0x20 [ 2401.244943] kmem_cache_alloc+0x5b/0x310 [ 2401.245598] jbd2__journal_start+0x190/0x7e0 [ 2401.246318] __ext4_journal_start_sb+0x214/0x390 [ 2401.247072] ext4_da_write_begin+0x51f/0xd40 [ 2401.247775] ? ext4_write_begin+0x10f0/0x10f0 [ 2401.248471] ? copyout_mc+0x140/0x140 [ 2401.249083] generic_perform_write+0x20a/0x4f0 [ 2401.249821] ? page_cache_prev_miss+0x310/0x310 [ 2401.250554] ? down_write_killable+0x180/0x180 [ 2401.251295] ext4_buffered_write_iter+0x232/0x4a0 [ 2401.252070] ext4_file_write_iter+0xc11/0x18d0 [ 2401.252804] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2401.253536] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.254379] new_sync_write+0x42c/0x660 [ 2401.255005] ? new_sync_read+0x6f0/0x6f0 [ 2401.255653] ? ksys_write+0x12d/0x260 [ 2401.256263] ? lock_release+0x680/0x680 [ 2401.256887] ? selinux_file_permission+0x92/0x520 [ 2401.257648] ? __fget_files+0x296/0x4c0 [ 2401.258363] vfs_write+0x747/0xa70 [ 2401.258934] ksys_write+0x12d/0x260 [ 2401.259508] ? __ia32_sys_read+0xb0/0xb0 [ 2401.260147] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.260967] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.261788] do_syscall_64+0x33/0x40 [ 2401.262378] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2401.263175] RIP: 0033:0x7fcf10a65b19 [ 2401.263761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.266748] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2401.267928] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2401.269023] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2401.270146] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.271251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2401.272347] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 09:32:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 75) 09:32:15 executing program 3: read(0xffffffffffffffff, &(0x7f0000000000)=""/195, 0xc3) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x1, 0x0, 0x0) [ 2401.326422] FAULT_INJECTION: forcing a failure. [ 2401.326422] name failslab, interval 1, probability 0, space 0, times 0 [ 2401.328626] CPU: 1 PID: 11261 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2401.329717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.331005] Call Trace: [ 2401.331426] dump_stack+0x107/0x167 [ 2401.332003] should_fail.cold+0x5/0xa [ 2401.332607] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2401.333431] should_failslab+0x5/0x20 [ 2401.334033] __kmalloc_node+0x76/0x420 [ 2401.334653] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2401.335451] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 2401.336238] ? trace_hardirqs_on+0x5b/0x180 [ 2401.336923] kmem_cache_alloc+0x171/0x310 [ 2401.337582] alloc_buffer_head+0x20/0x110 [ 2401.338241] alloc_page_buffers+0x14d/0x700 [ 2401.338925] create_empty_buffers+0x2c/0x640 [ 2401.339612] ? start_this_handle+0xfdd/0x1390 [ 2401.340314] ? start_this_handle+0xd57/0x1390 [ 2401.341022] create_page_buffers+0x1bb/0x230 [ 2401.341725] __block_write_begin_int+0x1d1/0x19c0 [ 2401.342489] ? ext4_da_release_space+0x480/0x480 [ 2401.343239] ? kmem_cache_alloc+0x2a6/0x310 [ 2401.343923] ? remove_inode_buffers+0x300/0x300 [ 2401.344645] ? jbd2__journal_start+0xf3/0x7e0 [ 2401.345369] ext4_da_write_begin+0x37d/0xd40 [ 2401.346076] ? ext4_write_begin+0x10f0/0x10f0 [ 2401.346770] ? copyout_mc+0x140/0x140 [ 2401.347379] generic_perform_write+0x20a/0x4f0 [ 2401.348108] ? page_cache_prev_miss+0x310/0x310 [ 2401.348840] ? down_write_killable+0x180/0x180 [ 2401.349570] ext4_buffered_write_iter+0x232/0x4a0 [ 2401.350337] ext4_file_write_iter+0xc11/0x18d0 [ 2401.351072] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2401.351789] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.352622] new_sync_write+0x42c/0x660 [ 2401.353249] ? new_sync_read+0x6f0/0x6f0 [ 2401.353899] ? ksys_write+0x12d/0x260 [ 2401.354508] ? lock_release+0x680/0x680 [ 2401.355131] ? selinux_file_permission+0x92/0x520 [ 2401.355895] ? __fget_files+0x296/0x4c0 [ 2401.356535] vfs_write+0x747/0xa70 [ 2401.357108] ksys_write+0x12d/0x260 [ 2401.357692] ? __ia32_sys_read+0xb0/0xb0 [ 2401.358341] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.359164] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.359982] do_syscall_64+0x33/0x40 [ 2401.360564] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2401.361364] RIP: 0033:0x7f1b43d12b19 [ 2401.361964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.365025] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2401.366210] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2401.367315] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2401.368416] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.369514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2401.370619] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 [ 2401.398556] FAULT_INJECTION: forcing a failure. [ 2401.398556] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2401.401011] CPU: 0 PID: 11268 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2401.402143] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.403478] Call Trace: [ 2401.403918] dump_stack+0x107/0x167 [ 2401.404512] should_fail.cold+0x5/0xa [ 2401.405140] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2401.406031] generic_perform_write+0x279/0x4f0 [ 2401.406782] ? page_cache_prev_miss+0x310/0x310 [ 2401.407541] ? down_write_killable+0x180/0x180 [ 2401.408295] ext4_buffered_write_iter+0x232/0x4a0 [ 2401.409082] ext4_file_write_iter+0xc11/0x18d0 [ 2401.409845] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2401.410596] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.411427] new_sync_write+0x42c/0x660 [ 2401.412076] ? new_sync_read+0x6f0/0x6f0 [ 2401.412740] ? ksys_write+0x12d/0x260 [ 2401.413363] ? lock_release+0x680/0x680 [ 2401.413994] ? selinux_file_permission+0x92/0x520 [ 2401.414781] ? __fget_files+0x296/0x4c0 [ 2401.415439] vfs_write+0x747/0xa70 [ 2401.416005] ksys_write+0x12d/0x260 [ 2401.416594] ? __ia32_sys_read+0xb0/0xb0 [ 2401.417242] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.418096] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.418905] do_syscall_64+0x33/0x40 [ 2401.419509] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2401.420311] RIP: 0033:0x7f8c54bcdb19 [ 2401.420917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.423775] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2401.425003] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2401.426161] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2401.427311] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.428454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2401.429601] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:32:15 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:32:15 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc080661a, &(0x7f00000004c0)=0x10000100000) 09:32:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 70) 09:32:15 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) ftruncate(r0, 0xd1) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() tkill(r2, 0x7) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, r2, 0x7, 0xffffffffffffffff, 0x1) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) syz_open_procfs(r2, &(0x7f0000000000)='net/mcfilter\x00') 09:32:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 88) [ 2401.513095] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2401.534264] FAULT_INJECTION: forcing a failure. [ 2401.534264] name failslab, interval 1, probability 0, space 0, times 0 [ 2401.536429] CPU: 1 PID: 11277 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2401.537546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.538882] Call Trace: [ 2401.539315] dump_stack+0x107/0x167 [ 2401.539910] should_fail.cold+0x5/0xa [ 2401.540530] ? create_object.isra.0+0x3a/0xa20 [ 2401.541269] should_failslab+0x5/0x20 [ 2401.541889] kmem_cache_alloc+0x5b/0x310 [ 2401.542553] create_object.isra.0+0x3a/0xa20 [ 2401.543268] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2401.544111] kmem_cache_alloc+0x159/0x310 [ 2401.544836] alloc_buffer_head+0x20/0x110 [ 2401.545504] alloc_page_buffers+0x14d/0x700 [ 2401.546211] create_empty_buffers+0x2c/0x640 [ 2401.546918] ? start_this_handle+0xfdd/0x1390 [ 2401.547677] ? start_this_handle+0xd57/0x1390 [ 2401.548406] create_page_buffers+0x1bb/0x230 [ 2401.549134] __block_write_begin_int+0x1d1/0x19c0 [ 2401.549926] ? ext4_da_release_space+0x480/0x480 [ 2401.550693] ? kmem_cache_alloc+0x2a6/0x310 [ 2401.551383] ? remove_inode_buffers+0x300/0x300 [ 2401.552132] ? jbd2__journal_start+0xf3/0x7e0 [ 2401.552854] ext4_da_write_begin+0x37d/0xd40 [ 2401.553583] ? ext4_write_begin+0x10f0/0x10f0 [ 2401.554284] ? copyout_mc+0x140/0x140 [ 2401.554914] generic_perform_write+0x20a/0x4f0 [ 2401.555662] ? page_cache_prev_miss+0x310/0x310 [ 2401.556417] ? down_write_killable+0x180/0x180 [ 2401.557168] ext4_buffered_write_iter+0x232/0x4a0 [ 2401.557961] ext4_file_write_iter+0xc11/0x18d0 [ 2401.558718] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2401.559464] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.560320] new_sync_write+0x42c/0x660 [ 2401.560946] ? new_sync_read+0x6f0/0x6f0 [ 2401.561607] ? ksys_write+0x12d/0x260 [ 2401.562216] ? lock_release+0x680/0x680 [ 2401.562856] ? selinux_file_permission+0x92/0x520 [ 2401.563616] ? __fget_files+0x296/0x4c0 [ 2401.564269] vfs_write+0x747/0xa70 [ 2401.564836] ksys_write+0x12d/0x260 [ 2401.565430] ? __ia32_sys_read+0xb0/0xb0 [ 2401.566077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.566917] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.567727] do_syscall_64+0x33/0x40 [ 2401.568330] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2401.569126] RIP: 0033:0x7f0fd57bab19 [ 2401.569730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.572681] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2401.573872] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2401.575019] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2401.576168] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.577312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2401.578471] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 09:32:15 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0xc0c0583b, &(0x7f00000004c0)=0x10000100000) [ 2401.630691] FAULT_INJECTION: forcing a failure. [ 2401.630691] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2401.632806] CPU: 0 PID: 11283 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2401.633939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.635304] Call Trace: [ 2401.635751] dump_stack+0x107/0x167 [ 2401.636358] should_fail.cold+0x5/0xa [ 2401.637007] __alloc_pages_nodemask+0x182/0x600 [ 2401.637784] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2401.638769] ? find_get_entry+0x2c8/0x740 [ 2401.639448] ? vmacache_find+0x55/0x2a0 [ 2401.640114] alloc_pages_current+0x187/0x280 [ 2401.640843] __page_cache_alloc+0x2d2/0x360 [ 2401.641568] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.642447] pagecache_get_page+0x2c7/0xc80 [ 2401.643157] ? asm_exc_page_fault+0x1e/0x30 [ 2401.643883] grab_cache_page_write_begin+0x64/0xa0 [ 2401.644704] ext4_da_write_begin+0x2f3/0xd40 [ 2401.645436] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2401.646318] ? ext4_write_begin+0x10f0/0x10f0 [ 2401.647047] ? copyout_mc+0x140/0x140 [ 2401.647683] generic_perform_write+0x20a/0x4f0 [ 2401.648444] ? page_cache_prev_miss+0x310/0x310 [ 2401.649220] ? down_write_killable+0x180/0x180 [ 2401.649992] ext4_buffered_write_iter+0x232/0x4a0 [ 2401.650784] ext4_file_write_iter+0xc11/0x18d0 [ 2401.651556] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2401.652319] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.653204] new_sync_write+0x42c/0x660 [ 2401.653875] ? new_sync_read+0x6f0/0x6f0 [ 2401.654545] ? ksys_write+0x12d/0x260 [ 2401.655156] ? lock_release+0x680/0x680 [ 2401.655784] ? selinux_file_permission+0x92/0x520 [ 2401.656551] ? __fget_files+0x296/0x4c0 [ 2401.657366] vfs_write+0x747/0xa70 [ 2401.657937] ksys_write+0x12d/0x260 [ 2401.658504] ? __ia32_sys_read+0xb0/0xb0 [ 2401.659159] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.659982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.660787] do_syscall_64+0x33/0x40 [ 2401.661364] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2401.662176] RIP: 0033:0x7fcf10a65b19 [ 2401.662754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.665624] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2401.666828] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2401.667934] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2401.669055] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.670174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2401.671271] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 09:32:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 76) 09:32:16 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d", 0x6a, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:32:16 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000080000) 09:32:16 executing program 3: fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:usbtty_device_t:s0\x00', 0x25, 0x2) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) [ 2401.792718] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2401.880719] FAULT_INJECTION: forcing a failure. [ 2401.880719] name failslab, interval 1, probability 0, space 0, times 0 [ 2401.882745] CPU: 1 PID: 11292 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2401.883735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2401.884913] Call Trace: [ 2401.885300] dump_stack+0x107/0x167 [ 2401.885836] should_fail.cold+0x5/0xa [ 2401.886384] ? create_object.isra.0+0x3a/0xa20 [ 2401.887045] should_failslab+0x5/0x20 [ 2401.887598] kmem_cache_alloc+0x5b/0x310 [ 2401.888190] create_object.isra.0+0x3a/0xa20 [ 2401.888820] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2401.889553] kmem_cache_alloc+0x159/0x310 [ 2401.890165] alloc_buffer_head+0x20/0x110 [ 2401.890765] alloc_page_buffers+0x14d/0x700 [ 2401.891391] create_empty_buffers+0x2c/0x640 [ 2401.892024] ? start_this_handle+0xfdd/0x1390 [ 2401.892662] ? start_this_handle+0xd57/0x1390 [ 2401.893310] create_page_buffers+0x1bb/0x230 [ 2401.893954] __block_write_begin_int+0x1d1/0x19c0 [ 2401.894656] ? ext4_da_release_space+0x480/0x480 [ 2401.895336] ? kmem_cache_alloc+0x2a6/0x310 [ 2401.895967] ? remove_inode_buffers+0x300/0x300 [ 2401.896630] ? jbd2__journal_start+0xf3/0x7e0 [ 2401.897293] ext4_da_write_begin+0x37d/0xd40 [ 2401.897947] ? ext4_write_begin+0x10f0/0x10f0 [ 2401.898593] ? copyout_mc+0x140/0x140 [ 2401.899154] generic_perform_write+0x20a/0x4f0 [ 2401.899821] ? page_cache_prev_miss+0x310/0x310 [ 2401.900493] ? down_write_killable+0x180/0x180 [ 2401.901161] ext4_buffered_write_iter+0x232/0x4a0 [ 2401.901865] ext4_file_write_iter+0xc11/0x18d0 [ 2401.902538] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2401.903201] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2401.903967] new_sync_write+0x42c/0x660 [ 2401.904540] ? new_sync_read+0x6f0/0x6f0 [ 2401.905127] ? ksys_write+0x12d/0x260 [ 2401.905683] ? lock_release+0x680/0x680 [ 2401.906266] ? selinux_file_permission+0x92/0x520 [ 2401.906957] ? __fget_files+0x296/0x4c0 [ 2401.907537] vfs_write+0x747/0xa70 [ 2401.908061] ksys_write+0x12d/0x260 [ 2401.908585] ? __ia32_sys_read+0xb0/0xb0 [ 2401.909174] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2401.909934] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2401.910671] do_syscall_64+0x33/0x40 [ 2401.911206] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2401.911939] RIP: 0033:0x7f8c54bcdb19 [ 2401.912472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2401.915067] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2401.916148] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2401.917158] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2401.918173] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2401.919187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2401.920200] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:32:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 73) 09:32:30 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e", 0x9f, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:32:30 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:32:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 71) 09:32:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 89) 09:32:30 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100002) 09:32:30 executing program 3: close(0xffffffffffffffff) 09:32:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 77) [ 2415.776647] FAULT_INJECTION: forcing a failure. [ 2415.776647] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.778109] CPU: 0 PID: 11311 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2415.778882] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2415.779803] Call Trace: [ 2415.780105] dump_stack+0x107/0x167 [ 2415.780520] should_fail.cold+0x5/0xa [ 2415.780952] ? create_object.isra.0+0x3a/0xa20 [ 2415.781467] should_failslab+0x5/0x20 [ 2415.781901] kmem_cache_alloc+0x5b/0x310 [ 2415.782356] create_object.isra.0+0x3a/0xa20 [ 2415.782841] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2415.783402] kmem_cache_alloc+0x159/0x310 [ 2415.783868] alloc_buffer_head+0x20/0x110 [ 2415.784324] alloc_page_buffers+0x14d/0x700 [ 2415.784810] create_empty_buffers+0x2c/0x640 [ 2415.785294] ? start_this_handle+0xfdd/0x1390 [ 2415.785791] ? start_this_handle+0xd57/0x1390 [ 2415.786305] create_page_buffers+0x1bb/0x230 [ 2415.786792] __block_write_begin_int+0x1d1/0x19c0 [ 2415.787320] ? ext4_da_release_space+0x480/0x480 [ 2415.787852] ? kmem_cache_alloc+0x2a6/0x310 [ 2415.788327] ? remove_inode_buffers+0x300/0x300 [ 2415.788836] ? jbd2__journal_start+0xf3/0x7e0 [ 2415.789342] ext4_da_write_begin+0x37d/0xd40 [ 2415.789856] ? ext4_write_begin+0x10f0/0x10f0 [ 2415.790350] ? copyout_mc+0x140/0x140 [ 2415.790786] generic_perform_write+0x20a/0x4f0 [ 2415.791091] FAULT_INJECTION: forcing a failure. [ 2415.791091] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.791293] ? page_cache_prev_miss+0x310/0x310 [ 2415.793802] ? down_write_killable+0x180/0x180 [ 2415.794320] ext4_buffered_write_iter+0x232/0x4a0 [ 2415.794844] ext4_file_write_iter+0xc11/0x18d0 [ 2415.795360] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2415.795863] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2415.796448] new_sync_write+0x42c/0x660 [ 2415.796896] ? new_sync_read+0x6f0/0x6f0 [ 2415.797347] ? ksys_write+0x12d/0x260 [ 2415.797766] ? lock_release+0x680/0x680 [ 2415.798162] ? selinux_file_permission+0x92/0x520 [ 2415.798691] ? __fget_files+0x296/0x4c0 [ 2415.799134] vfs_write+0x747/0xa70 [ 2415.799532] ksys_write+0x12d/0x260 [ 2415.799930] ? __ia32_sys_read+0xb0/0xb0 [ 2415.800378] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2415.800946] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2415.801507] do_syscall_64+0x33/0x40 [ 2415.801960] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2415.802513] RIP: 0033:0x7f0fd57bab19 [ 2415.802920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2415.804893] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2415.805706] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2415.806481] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2415.807244] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2415.808011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2415.808770] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 [ 2415.809571] CPU: 1 PID: 11307 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2415.810845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2415.812324] Call Trace: [ 2415.812759] dump_stack+0x107/0x167 [ 2415.813305] should_fail.cold+0x5/0xa [ 2415.813888] ? create_object.isra.0+0x3a/0xa20 [ 2415.814572] should_failslab+0x5/0x20 [ 2415.815142] kmem_cache_alloc+0x5b/0x310 [ 2415.815752] create_object.isra.0+0x3a/0xa20 [ 2415.816414] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2415.817174] kmem_cache_alloc+0x159/0x310 [ 2415.817801] alloc_buffer_head+0x20/0x110 [ 2415.818424] alloc_page_buffers+0x14d/0x700 [ 2415.819076] create_empty_buffers+0x2c/0x640 [ 2415.819728] ? start_this_handle+0xfdd/0x1390 [ 2415.820397] ? start_this_handle+0xd57/0x1390 [ 2415.821074] create_page_buffers+0x1bb/0x230 [ 2415.821735] __block_write_begin_int+0x1d1/0x19c0 [ 2415.822467] ? ext4_da_release_space+0x480/0x480 [ 2415.823219] ? kmem_cache_alloc+0x2a6/0x310 [ 2415.823883] ? remove_inode_buffers+0x300/0x300 [ 2415.824583] ? jbd2__journal_start+0xf3/0x7e0 [ 2415.825286] ext4_da_write_begin+0x37d/0xd40 [ 2415.825973] ? ext4_write_begin+0x10f0/0x10f0 [ 2415.826644] ? copyout_mc+0x140/0x140 [ 2415.827235] generic_perform_write+0x20a/0x4f0 [ 2415.827935] ? page_cache_prev_miss+0x310/0x310 [ 2415.828642] ? down_write_killable+0x180/0x180 [ 2415.829348] ext4_buffered_write_iter+0x232/0x4a0 [ 2415.830093] ext4_file_write_iter+0xc11/0x18d0 [ 2415.830797] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2415.831495] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2415.832299] new_sync_write+0x42c/0x660 [ 2415.832902] ? new_sync_read+0x6f0/0x6f0 [ 2415.833517] ? ksys_write+0x12d/0x260 [ 2415.834115] ? lock_release+0x680/0x680 [ 2415.834713] ? selinux_file_permission+0x92/0x520 [ 2415.835450] ? __fget_files+0x296/0x4c0 [ 2415.836067] vfs_write+0x747/0xa70 [ 2415.836616] ksys_write+0x12d/0x260 [ 2415.837178] ? __ia32_sys_read+0xb0/0xb0 [ 2415.837798] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2415.838599] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2415.839380] do_syscall_64+0x33/0x40 [ 2415.839945] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2415.840713] RIP: 0033:0x7fcf10a65b19 [ 2415.841280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2415.844058] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2415.845209] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2415.846294] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2415.847366] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2415.848635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2415.849698] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2415.855176] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2415.863314] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2415.873180] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:32:30 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x3) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000011c0)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @remote, 0x40}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000140)="65e4849f80862e51006ef9b52a30eccc505866cb375769513b559f91b36a590f021540111ff5e6f6ea6bab4831da6d5777a5c4205fb479dfb2de9e503a50c9062247510346a2a6c69899d12b286e6350d9a4542c76d5f873da5368ee6f90203c58e69cda98b6dd7ab6636ba22de267b8ce1af87c054acae7225d97d845cde15757b9d329aad5bdb6880f30f5501d3f4457ad7c1dc673cfe7", 0x98}], 0x1, &(0x7f0000000200)=[@hoplimit={{0x14, 0x29, 0x34, 0xffffffc0}}, @dstopts_2292={{0x28, 0x29, 0x4, {0xbf, 0x1, '\x00', [@ra={0x5, 0x2, 0x5}, @padn={0x1, 0x1, [0x0]}, @padn]}}}], 0x40}}, {{&(0x7f0000000240)={0xa, 0x4e21, 0x7fffffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xdca}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000280)="ad108f35701312de0e0826ba140d94fb22b8c0e13e46516b4c05d34dea5ee7ba249ef3709f40235c399e5a1af2375b917f5d14b5ef4b5bf61c9627a055ee0043123c8c32bb32976579cad270517542e0b34461f1951f59e2be88f7d21ee9552f679839d7983457a51629804f71b4d20f42e32f75c2a547cd1d6acc3dd35c46cebfbc6587b5966d5b6f435ec63fdb2f39d13729268f11922965204ac887f3f838902f", 0xa2}, {&(0x7f0000000340)="d0d096fbdd76a315166eea3d1d9c740c460f8e0f998c0713db", 0x19}], 0x2}}, {{&(0x7f00000003c0)={0xa, 0x4e24, 0x2, @private2, 0x101}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000400)="b09759df2ce6909437f979b16e2ed8927b1db534ab4d6dee400ff5bd42a4bf162b8129b689b7bd8d53951f2cea7648d81921e069feb7289780bb0f8c83b9e56ef495f1f3176ae201665778ca4815acd38b1510ce9df08fdde32fc7a69c3927f5cd5bbb2461a4d6f41384d2c4b94abf16", 0x70}, {&(0x7f0000000480)="4c4f845a18b0a8861a0d8631fdc2472db832f930db422b8809772a6fd9db50d4b2c0e2c624b7475fdd298f969c485320c012d9e63dadb2a10a4cc402ae463cb8718fb8a163bdb3d50f961da82d6b8e70c9dd90e920953ea63169be6ee9e3a33b7736488628473cc0fdd5578ff520c9db6ed7c5d54c32d6619cd3aabaa2e756c6b5d843f4b637e3b15fa4b14d1185ae968860fd1703e4abe9473acac149261302fb0d0f4d486351f1f6b6b8f8bfb5d9b48d7a792fc445f9e21f681762", 0xbc}, {&(0x7f0000000540)="b21f07a6f701e401123cf35e462fb4ea1428f61afe316dbe7fadc1aa4675b2d17b47cdbcd246c8024264536a12b6de9d87588d32886a174423d6", 0x3a}], 0x3, &(0x7f00000005c0)=[@hopopts={{0x20, 0x29, 0x36, {0x21, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x6}]}}}, @dstopts_2292={{0x1d0, 0x29, 0x4, {0x2e, 0x36, '\x00', [@ra={0x5, 0x2, 0x53c1}, @generic={0x0, 0x7a, "080ef6794a9c2848fed5f4d51229fd794345510105235d56a179cf61ea271ba668d5af5e35dc5a43da42603bc546c082c8eb2dc24f07dd888645610b6089e0b0f0625efdeaccdf1e36795052139d517cdc13106aa02c3f71bd0f6f8a299e3803f950307c0ca36a9da39f7030f08861a3bc4e6b6eb14f267b4178"}, @hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @generic={0x3f, 0xf9, "da56187015dedfe44440c8950bcd27e3fcd376299ac189bed4de86ea324466206b2aea87b06e04355f172fee919009a15e4edb811fbda6c37fda609291911bf60c0bb1a82e5e50093f42b4b0932bfd8ed493d133a6fa20c87a0d02657a4534bc403cbff78f0eaefa0c2a18d67392b23b83a3b602a8e5fa18f3354651fa15880fc1116d1f78d97ab1f4a11247eba0a89e3f0e48e036e1dee85224fc3eb3f757b882d7cac979855248612d07948c205101ba7dcf187088da00af63a393cc920822d00d68235c8fd92df76727ada3bf2ceeed252e9df5d68e57749e4ee69f062771f258c30b2a16bab9550ba7f06372de37c51a154c060cd26f03"}, @ra={0x5, 0x2, 0x40}, @calipso={0x7, 0x20, {0x0, 0x6, 0x6, 0x200, [0xd500, 0x7, 0x1]}}]}}}], 0x1f0}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000007c0)="ef6f0ebb94367b5994ece64d7632dfc3cba4243c191176d49fdea28e50f5d63b7f37c18b6f68219b5d53db420a0f07beb77ba7b45b31386b698ceab36789214cacd5bf65c25c2c6b7cddbad4f7", 0x4d}], 0x1, &(0x7f0000000880)=[@hopopts_2292={{0xb0, 0x29, 0x36, {0xff, 0x12, '\x00', [@ra={0x5, 0x2, 0x1}, @jumbo, @generic={0x0, 0x40, "8a3ae03d583bdc4a1f43b4360665b2fe57873bc766d512be4cf62d75fa825c45b66ac1f1af1beb20fc5d344c2a516eaf81154ebe6f8b7b07c000ba7ea4d2ade7"}, @hao={0xc9, 0x10, @empty}, @pad1, @jumbo={0xc2, 0x4, 0xfffffffa}, @hao={0xc9, 0x10, @local}, @ra={0x5, 0x2, 0x16}, @ra={0x5, 0x2, 0x6642}, @hao={0xc9, 0x10, @remote}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4c9}}, @dstopts={{0x20, 0x29, 0x37, {0x0, 0x0, '\x00', [@pad1]}}}], 0xe8}}, {{&(0x7f0000000980)={0xa, 0x4e20, 0x2, @loopback, 0x9}, 0x1c, &(0x7f0000000d00)=[{&(0x7f00000009c0)="7144b58986b284da69227a29deb959c84598dd14ad291639fc4ba62872cafb13785838d5eb8a857548f133814a317df44bb75b8915548065844b29b2eead10782b90661bf0ca204db598227f1c9c975febf423c644389070e686ddb3bb0e3593944448475fafe3fd26fee27a0d34a3bc6eaa2b0df89c3e5b20b50019eb6ac46b9642380575991837974691e587992d545f8568e79991af8c2c1a0cfa0dd03387c6042fda75c79102f7a680e83e299a1b09884c239de321ea04b904c01871751fb43600cf9fe836f680390af895", 0xcd}, {&(0x7f0000000ac0)="20a2883e28bc2b542838b111a2617ee44b10ab54cc169f43b01be224a7f8bca7544204c4db287d2a731d89a675cbe957c4139a1c0e7eec19a29b662911748d66c5d96b632d46de73c88f51181eb448b03ce4e6c4b3b35088", 0x58}, {&(0x7f0000000b40)="b2528884b569830028395e68bc3b", 0xe}, {&(0x7f0000000b80)="875703ecf74742331f5c01cd7bd7d1df01f04036f73cc7c58c2ee2c6ebcb667138b8a3bf80ef33c1b3dffcd81dbec82ba22b1cf028cac0a2db4c96317458dea546b259dfd57f2100add73eccac158c3c98232b4fdaff64d362c9745a41a74d509d0240e1af90bed350257b63f4b53c59a6e290994923319b57528265faea03", 0x7f}, {&(0x7f0000000c00)="392d1728ef575758a588109c85b1ddbf88def6271907ccdf7371d6bd9245d4df585a0d56a9eef02614b38fef9e862460ae7511c10b2db011cd0904a1cafd0fc7f51adba06c55338aa99278318c15217d8be91142b76dcaf53d15b67bb7c6c6b8a08edcbc1787e6e42f08dcf9fad1b71aae355f52fc050d3ee194a08782811cb17b99b199d1085362170877c9674a8ede6cb3e381892f17152d8ecb818db6933abdb17aadc54d7811084ce966f4442b9180e9575e03e1ebc919f823c4e63af69e3e9449609f", 0xc5}], 0x5, &(0x7f0000000d80)=ANY=[@ANYBLOB="140000000000000029000000430000000700000000000000380000000000000029000000390000002904010000000000fe8000000000000000000000000000aafc010000000000000000000000000001b00000000000000029000000360000002f130000000000000103000000000100071800000001040007000002000000000000010000000000000004013fc910fe8000000000000000000000000000bbc910fc0200000000000000000000000000010401070534b8e0753e427fa0b340cd9ceaac5757e87479419c80f44114c5b0858a0927a9e2fea228c40a39547dae4c7df1a587979d40201112c910ff02000000000000000000000000000105020002"], 0x100}}, {{&(0x7f0000000e80)={0xa, 0x4e20, 0x80000000, @private2}, 0x1c, &(0x7f0000001140)=[{&(0x7f0000000ec0)="79d959d0dbb65ead30d18d8a25006fdd15773630c67e9e97ad042ecf2a32ab9e2b20a1838be610f394", 0x29}, {&(0x7f0000000f00)="db3a7e13f97442bccd3e23b7953b52454d327738c37b53a7184988d80b951dfd402a266181dbaf9eebda65289356fbb89beab5ca6a29df9293a706a783814901f559d65e2291f4e31b09940be108b9b320b2fd0b2383cd9fee9e3546dce16cc4014381abc2d5095728f943e3bf326360dccb4d4e9447f1051e85029058153f59b205b9401c1fe2e3489e488e68fb03a7f60af5908fe7f03298aadcf4d376a70eafb3cc11cf61d7fa27927f1c62dfdd864bd12ecf640f7593683a19de36c973c27be106482c57391e18da54eb6657c5c848", 0xd1}, {&(0x7f0000001000)="fde0aa0fbb513757dbe9b687347980bbf16ef33471480b9237d96405bcb216915aa16148727eec698ceb19e54be1f871", 0x30}, {&(0x7f0000001040)="7e40a26df7d7c36061cbd60b352da7a9a10fca4431f677cff2cccfb394e93f140540ea51dc3b229d94c6a874b440ed8e931f75097c3ec1e5c73928a1480428db594058f57fb88ccd3368e99e01f0a27a4c421eea7fd5fa01dc7806ecf3aa611716008e4a61a79fc08f6cdb6d596e6879a189312f9811fcf67b36a44536f72f9ed14638dba1136f3f32bdd86fa7757e4bb8b6a0a1556ffe5ded795f025d6d050bcec5033a272f241e0ceb14c3473a50", 0xaf}, {&(0x7f0000001100)="5d7b74b216a51c9701424a718f2e96c296c9bbc34dd42b2b1efae54a610f1994561dd48b19989364328c6b87e655245057d12b98efae670cbf83a864d4", 0x3d}], 0x5}}], 0x6, 0x4) prctl$PR_GET_DUMPABLE(0x3) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mq_notify(r3, &(0x7f0000002400)={0x0, 0x2b, 0x1, @thr={&(0x7f0000001340)="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", &(0x7f0000002340)="08fc8d66d68d9cf1e35c6040b2d397dc5c4061e7bd2e21216f98d13e357354fc216edcb4fefef41105e60539d8b31e04df20095d083a0e961742db03645437f93425eafc87ad0d4fc0297c7fdadc14c3425bbdb3785327b5df20cd870931c26706af62ff7d84673e86691aa724f6a288f50ff0d5a945429baca899509f933f0fed87e0cb14dee1b698c0771ae7dd53ca2b54d32d04d9abb63f74"}}) 09:32:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 72) [ 2415.934545] FAULT_INJECTION: forcing a failure. [ 2415.934545] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2415.935790] CPU: 0 PID: 11312 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2415.936356] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2415.937201] Call Trace: [ 2415.937482] dump_stack+0x107/0x167 [ 2415.937875] should_fail.cold+0x5/0xa [ 2415.938280] __alloc_pages_nodemask+0x182/0x600 [ 2415.938770] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2415.939396] ? find_get_entry+0x2c8/0x740 [ 2415.939746] ? vmacache_find+0x55/0x2a0 [ 2415.940162] alloc_pages_current+0x187/0x280 [ 2415.940531] __page_cache_alloc+0x2d2/0x360 [ 2415.940982] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2415.941392] pagecache_get_page+0x2c7/0xc80 [ 2415.941846] ? asm_exc_page_fault+0x1e/0x30 [ 2415.942212] grab_cache_page_write_begin+0x64/0xa0 [ 2415.942719] ext4_da_write_begin+0x2f3/0xd40 [ 2415.943088] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2415.943630] ? ext4_write_begin+0x10f0/0x10f0 [ 2415.944003] ? copyout_mc+0x140/0x140 [ 2415.944406] generic_perform_write+0x20a/0x4f0 [ 2415.944795] ? page_cache_prev_miss+0x310/0x310 [ 2415.945286] ext4_buffered_write_iter+0x232/0x4a0 [ 2415.945704] ext4_file_write_iter+0xc11/0x18d0 [ 2415.946214] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2415.946694] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2415.947157] new_sync_write+0x42c/0x660 [ 2415.947578] ? new_sync_read+0x6f0/0x6f0 [ 2415.947930] ? ksys_write+0x12d/0x260 [ 2415.948334] ? lock_release+0x680/0x680 [ 2415.948646] ? selinux_file_permission+0x92/0x520 [ 2415.949158] ? __fget_files+0x296/0x4c0 [ 2415.949499] vfs_write+0x747/0xa70 [ 2415.949891] ksys_write+0x12d/0x260 [ 2415.950279] ? __ia32_sys_read+0xb0/0xb0 [ 2415.950694] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2415.951152] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2415.951693] do_syscall_64+0x33/0x40 [ 2415.952022] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2415.952558] RIP: 0033:0x7f1b43d12b19 [ 2415.952876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2415.954793] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2415.955583] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2415.956325] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2415.957063] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2415.957796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2415.958552] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 [ 2415.960667] cgroup: fork rejected by pids controller in /syz1 [ 2415.984470] FAULT_INJECTION: forcing a failure. [ 2415.984470] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.987048] CPU: 1 PID: 11318 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2415.988256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2415.989709] Call Trace: [ 2415.990203] dump_stack+0x107/0x167 [ 2415.990851] should_fail.cold+0x5/0xa [ 2415.991545] ? jbd2__journal_start+0x190/0x7e0 [ 2415.992353] should_failslab+0x5/0x20 [ 2415.993034] kmem_cache_alloc+0x5b/0x310 [ 2415.993758] jbd2__journal_start+0x190/0x7e0 [ 2415.994573] __ext4_journal_start_sb+0x214/0x390 [ 2415.995422] ext4_da_write_begin+0x51f/0xd40 [ 2415.996232] ? ext4_write_begin+0x10f0/0x10f0 [ 2415.997019] ? copyout_mc+0x140/0x140 [ 2415.997716] generic_perform_write+0x20a/0x4f0 [ 2415.998543] ? page_cache_prev_miss+0x310/0x310 [ 2415.999382] ? down_write_killable+0x180/0x180 [ 2416.000215] ext4_buffered_write_iter+0x232/0x4a0 [ 2416.001085] ext4_file_write_iter+0xc11/0x18d0 [ 2416.001940] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2416.002754] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 09:32:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 90) [ 2416.003702] new_sync_write+0x42c/0x660 [ 2416.004572] ? new_sync_read+0x6f0/0x6f0 [ 2416.005318] ? ksys_write+0x12d/0x260 [ 2416.006035] ? lock_release+0x680/0x680 [ 2416.006763] ? selinux_file_permission+0x92/0x520 [ 2416.007650] ? __fget_files+0x296/0x4c0 [ 2416.008390] vfs_write+0x747/0xa70 [ 2416.009052] ksys_write+0x12d/0x260 [ 2416.009722] ? __ia32_sys_read+0xb0/0xb0 [ 2416.010487] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2416.011448] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2416.012385] do_syscall_64+0x33/0x40 [ 2416.013057] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2416.013982] RIP: 0033:0x7f8c54bcdb19 [ 2416.014656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2416.017902] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2416.019250] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2416.020489] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2416.021739] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2416.023005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2416.024243] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:32:30 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) r0 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x22880, 0x21, 0x1}, 0x18) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)={0x3, 0xffffffffffffffff}) mq_timedsend(r0, &(0x7f0000000140)="fc05b6d070581d59019b4e8b151dbc7592f3ab1484eaabd457cae558b57261bdcc8b232aa72d14e7c91d99893e80d691ea5aee9203364c67e0d699cfb9b831326cabfbcfffc8cffb1f9bbf5cac5542cc8fadd7178ffb31505822c78a687ce42be5a2631a57d7bd03f65b376216dafa7e73cfa3950d36f393b1474e27bd42f0898229e61b873b4b67613ff6efc28f81d77fd023f54c3f9589b22e79ea9c939842f67e45d87a92a04d8d8d283681ed84cea5678748aab8243605250b2b07766ad78ad1a4bd7d65d9b762d6957ee92e21ae6592f116696cfddd3084234f0e04170d167b8ad075fbe8c9bc", 0xe9, 0x800, &(0x7f0000000080)={0x77359400}) [ 2416.061142] FAULT_INJECTION: forcing a failure. [ 2416.061142] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2416.062104] CPU: 0 PID: 11326 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2416.062611] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2416.063216] Call Trace: [ 2416.063421] dump_stack+0x107/0x167 [ 2416.063692] should_fail.cold+0x5/0xa [ 2416.063981] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2416.064382] generic_perform_write+0x279/0x4f0 [ 2416.064723] ? page_cache_prev_miss+0x310/0x310 [ 2416.065071] ? down_write_killable+0x180/0x180 [ 2416.065415] ext4_buffered_write_iter+0x232/0x4a0 [ 2416.065775] ext4_file_write_iter+0xc11/0x18d0 [ 2416.066128] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2416.066471] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2416.066868] new_sync_write+0x42c/0x660 [ 2416.067161] ? new_sync_read+0x6f0/0x6f0 [ 2416.067460] ? ksys_write+0x12d/0x260 [ 2416.067744] ? lock_release+0x680/0x680 [ 2416.068042] ? selinux_file_permission+0x92/0x520 [ 2416.068401] ? __fget_files+0x296/0x4c0 [ 2416.068703] vfs_write+0x747/0xa70 [ 2416.068970] ksys_write+0x12d/0x260 [ 2416.069240] ? __ia32_sys_read+0xb0/0xb0 [ 2416.069540] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2416.069937] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2416.070317] do_syscall_64+0x33/0x40 [ 2416.070592] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2416.070969] RIP: 0033:0x7f0fd57bab19 [ 2416.071245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2416.072570] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2416.073129] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2416.073648] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2416.074176] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2416.074694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2416.075215] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 09:32:30 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100003) [ 2416.111197] FAULT_INJECTION: forcing a failure. [ 2416.111197] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2416.113205] CPU: 1 PID: 11430 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2416.114364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2416.115732] Call Trace: [ 2416.116191] dump_stack+0x107/0x167 [ 2416.116805] should_fail.cold+0x5/0xa [ 2416.117454] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2416.118369] generic_perform_write+0x279/0x4f0 [ 2416.119151] ? page_cache_prev_miss+0x310/0x310 [ 2416.119931] ? down_write_killable+0x180/0x180 [ 2416.120707] ext4_buffered_write_iter+0x232/0x4a0 [ 2416.121518] ext4_file_write_iter+0xc11/0x18d0 [ 2416.122309] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2416.123080] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2416.123954] new_sync_write+0x42c/0x660 [ 2416.124621] ? new_sync_read+0x6f0/0x6f0 [ 2416.125301] ? ksys_write+0x12d/0x260 [ 2416.125952] ? lock_release+0x680/0x680 [ 2416.126620] ? selinux_file_permission+0x92/0x520 [ 2416.127432] ? __fget_files+0x296/0x4c0 [ 2416.128114] vfs_write+0x747/0xa70 [ 2416.128716] ksys_write+0x12d/0x260 [ 2416.129329] ? __ia32_sys_read+0xb0/0xb0 [ 2416.130020] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2416.130889] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2416.131751] do_syscall_64+0x33/0x40 [ 2416.132372] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2416.133224] RIP: 0033:0x7fcf10a65b19 [ 2416.133856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2416.135805] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2416.136898] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2416.136923] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2416.136940] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2416.141198] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2416.142379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2416.143550] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 09:32:42 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e", 0x9f, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:32:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 73) 09:32:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 91) 09:32:42 executing program 3: mq_open(&(0x7f00000000c0)='[\xc3u\xd1\x86\xbbx\xdc\x85\xc0\x82\xda\x87\xee.+-)]\x00\xe9*rP\x13\b\xaa\xa0\x10\xb5Y\xe2\xd7\x9a\xdb\\$\xa4j\x12\x85Q\xd9\x05\x9ctq3\xcb\x1f\x00\x00\x00\x00\x00\x00\x00\xd1\xb6\x1d\x90\x97\xd1\x03>0\x90;Fr0\x8b\x9b^[\xda\x91\xb1\x0f#\xa8\x84l\xdcO\xf3B\x94\xb8W\xc2\f\xb6\xa9\x9e\r\xd7\xa0#t\r\x810\xa3*\xab\x88\xfd\xf5\xc3 ^\x85&|o\xf8z\x88\x83\xae\x8f\xc1\x01\xc4\xf4,{0\xde-\xde\x17\xb5\xb5Kq8Rp\xcc\x98\xa0xh\xea\x81Eo\v\x8cj\xb6)\x0e\xaf\x9ep\x99\xc1K\xa4-\vW\xa0\x1cb\xc6]\x80(\xae\x00\x89X=\x00\x00\x00\x00', 0x0, 0x0, 0x0) 09:32:42 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:32:42 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100004) 09:32:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 78) 09:32:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 74) [ 2428.629141] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2428.634287] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2428.636521] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:32:42 executing program 3: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) mq_open(&(0x7f0000000000)='.+-[A\xbe\x8da\xf3\x98\xd8f\xa2\x92\x99\xc4\xa5\xe5v\xfcV\x1e\"\xd7\xdf\xa8{2\x00\xdb\x048g\x85o\x05\x00\x00\x00\x00\x00\x00\x00\x01\xea\xd1\x02\x00@\x8e\x1bc\xf1\xda[/\xd0\x17\x849G\xc0\x86\tQ\xa4\xf0U\xeer\x93\"\x8b}\x17\xc3\x1a;\x00\x00\x00\x00\x00\x00\x89\x11\xdc\x1d\xf7\xd7\x00\x00\xc5\xe0\x0e\xf2\x9c\xaf\xbeZ\xa8$\x03\xf8 \x8c\xf5v\xeb,~\xe7\x9c\xb7', 0x800, 0xa, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 2428.676384] FAULT_INJECTION: forcing a failure. [ 2428.676384] name failslab, interval 1, probability 0, space 0, times 0 [ 2428.678149] CPU: 1 PID: 11459 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2428.679130] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2428.680295] Call Trace: [ 2428.680674] dump_stack+0x107/0x167 [ 2428.681192] should_fail.cold+0x5/0xa [ 2428.681736] ? create_object.isra.0+0x3a/0xa20 [ 2428.682410] should_failslab+0x5/0x20 [ 2428.682961] kmem_cache_alloc+0x5b/0x310 [ 2428.683548] create_object.isra.0+0x3a/0xa20 [ 2428.684181] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2428.684900] kmem_cache_alloc+0x159/0x310 [ 2428.685496] alloc_buffer_head+0x20/0x110 [ 2428.686092] alloc_page_buffers+0x14d/0x700 [ 2428.686707] create_empty_buffers+0x2c/0x640 [ 2428.687346] ? start_this_handle+0xfdd/0x1390 [ 2428.687975] ? start_this_handle+0xd57/0x1390 [ 2428.688616] create_page_buffers+0x1bb/0x230 [ 2428.689242] __block_write_begin_int+0x1d1/0x19c0 [ 2428.689936] ? ext4_da_release_space+0x480/0x480 [ 2428.690619] ? kmem_cache_alloc+0x2a6/0x310 [ 2428.691237] ? remove_inode_buffers+0x300/0x300 [ 2428.691893] ? jbd2__journal_start+0xf3/0x7e0 [ 2428.692583] ext4_da_write_begin+0x37d/0xd40 [ 2428.693223] ? ext4_write_begin+0x10f0/0x10f0 [ 2428.693859] ? copyout_mc+0x140/0x140 [ 2428.694427] generic_perform_write+0x20a/0x4f0 [ 2428.695083] ? page_cache_prev_miss+0x310/0x310 [ 2428.695741] ? down_write_killable+0x180/0x180 [ 2428.696395] ext4_buffered_write_iter+0x232/0x4a0 [ 2428.697073] ext4_file_write_iter+0xc11/0x18d0 [ 2428.697732] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2428.698388] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2428.699145] new_sync_write+0x42c/0x660 [ 2428.699702] ? new_sync_read+0x6f0/0x6f0 [ 2428.700279] ? ksys_write+0x12d/0x260 [ 2428.700818] ? lock_release+0x680/0x680 [ 2428.701386] ? selinux_file_permission+0x92/0x520 [ 2428.702101] ? __fget_files+0x296/0x4c0 [ 2428.702672] vfs_write+0x747/0xa70 [ 2428.703183] ksys_write+0x12d/0x260 [ 2428.703700] ? __ia32_sys_read+0xb0/0xb0 [ 2428.704288] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2428.705032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2428.705763] do_syscall_64+0x33/0x40 [ 2428.706314] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2428.707042] RIP: 0033:0x7fcf10a65b19 [ 2428.707561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2428.710139] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2428.711028] FAULT_INJECTION: forcing a failure. [ 2428.711028] name failslab, interval 1, probability 0, space 0, times 0 [ 2428.711217] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2428.711244] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2428.714986] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2428.715989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2428.716989] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2428.718032] CPU: 0 PID: 11456 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2428.719136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2428.720440] Call Trace: [ 2428.720865] dump_stack+0x107/0x167 [ 2428.721450] should_fail.cold+0x5/0xa [ 2428.722068] ? create_object.isra.0+0x3a/0xa20 [ 2428.722799] should_failslab+0x5/0x20 [ 2428.723404] kmem_cache_alloc+0x5b/0x310 [ 2428.724042] ? lru_cache_add+0x45c/0x800 [ 2428.724694] create_object.isra.0+0x3a/0xa20 [ 2428.725404] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2428.726224] kmem_cache_alloc+0x159/0x310 [ 2428.726852] jbd2__journal_start+0x190/0x7e0 [ 2428.727559] __ext4_journal_start_sb+0x214/0x390 [ 2428.728281] ext4_da_write_begin+0x51f/0xd40 [ 2428.728997] ? ext4_write_begin+0x10f0/0x10f0 [ 2428.729664] ? copyout_mc+0x140/0x140 [ 2428.730291] generic_perform_write+0x20a/0x4f0 [ 2428.731001] ? page_cache_prev_miss+0x310/0x310 [ 2428.731746] ? down_write_killable+0x180/0x180 [ 2428.732450] ext4_buffered_write_iter+0x232/0x4a0 [ 2428.733231] ext4_file_write_iter+0xc11/0x18d0 [ 2428.733935] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2428.734677] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2428.735474] new_sync_write+0x42c/0x660 [ 2428.736115] ? new_sync_read+0x6f0/0x6f0 [ 2428.736731] ? ksys_write+0x12d/0x260 [ 2428.737342] ? lock_release+0x680/0x680 [ 2428.737947] ? selinux_file_permission+0x92/0x520 [ 2428.738723] ? __fget_files+0x296/0x4c0 [ 2428.739334] vfs_write+0x747/0xa70 [ 2428.739911] ksys_write+0x12d/0x260 [ 2428.740483] ? __ia32_sys_read+0xb0/0xb0 [ 2428.741136] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2428.741922] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2428.742752] do_syscall_64+0x33/0x40 [ 2428.743315] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2428.744128] RIP: 0033:0x7f8c54bcdb19 [ 2428.744695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2428.747609] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2428.748751] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2428.749890] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2428.751022] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2428.752155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2428.753284] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2428.764352] FAULT_INJECTION: forcing a failure. [ 2428.764352] name failslab, interval 1, probability 0, space 0, times 0 [ 2428.766451] CPU: 0 PID: 11451 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2428.767554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2428.768872] Call Trace: [ 2428.769295] dump_stack+0x107/0x167 [ 2428.769880] should_fail.cold+0x5/0xa [ 2428.770494] ? create_object.isra.0+0x3a/0xa20 [ 2428.771225] should_failslab+0x5/0x20 [ 2428.771829] kmem_cache_alloc+0x5b/0x310 [ 2428.772440] ? lru_cache_add+0x45c/0x800 [ 2428.773094] create_object.isra.0+0x3a/0xa20 [ 2428.773755] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2428.774577] kmem_cache_alloc+0x159/0x310 [ 2428.775217] jbd2__journal_start+0x190/0x7e0 [ 2428.775931] __ext4_journal_start_sb+0x214/0x390 [ 2428.776657] ext4_da_write_begin+0x51f/0xd40 [ 2428.777377] ? ext4_write_begin+0x10f0/0x10f0 [ 2428.778061] ? copyout_mc+0x140/0x140 [ 2428.778678] generic_perform_write+0x20a/0x4f0 [ 2428.779375] ? page_cache_prev_miss+0x310/0x310 [ 2428.780132] ? down_write_killable+0x180/0x180 [ 2428.780833] ext4_buffered_write_iter+0x232/0x4a0 [ 2428.781617] ext4_file_write_iter+0xc11/0x18d0 [ 2428.782376] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2428.783140] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2428.783999] new_sync_write+0x42c/0x660 [ 2428.784652] ? new_sync_read+0x6f0/0x6f0 [ 2428.785313] ? ksys_write+0x12d/0x260 [ 2428.785938] ? lock_release+0x680/0x680 [ 2428.786590] ? selinux_file_permission+0x92/0x520 [ 2428.787382] ? __fget_files+0x296/0x4c0 [ 2428.788006] vfs_write+0x747/0xa70 [ 2428.788593] ksys_write+0x12d/0x260 [ 2428.789151] ? __ia32_sys_read+0xb0/0xb0 [ 2428.789810] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2428.790603] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2428.791425] do_syscall_64+0x33/0x40 [ 2428.791999] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2428.792961] RIP: 0033:0x7f0fd57bab19 [ 2428.793523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2428.796426] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2428.797560] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2428.798690] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2428.799815] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2428.800943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2428.802078] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 [ 2428.804483] FAULT_INJECTION: forcing a failure. [ 2428.804483] name failslab, interval 1, probability 0, space 0, times 0 [ 2428.806676] CPU: 0 PID: 11461 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2428.807778] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2428.809087] Call Trace: [ 2428.809512] dump_stack+0x107/0x167 [ 2428.810102] should_fail.cold+0x5/0xa [ 2428.810710] ? create_object.isra.0+0x3a/0xa20 [ 2428.811440] should_failslab+0x5/0x20 [ 2428.812048] kmem_cache_alloc+0x5b/0x310 [ 2428.812703] create_object.isra.0+0x3a/0xa20 [ 2428.813410] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2428.814228] kmem_cache_alloc+0x159/0x310 [ 2428.814901] alloc_buffer_head+0x20/0x110 [ 2428.815557] alloc_page_buffers+0x14d/0x700 [ 2428.816251] create_empty_buffers+0x2c/0x640 [ 2428.816953] ? start_this_handle+0xfdd/0x1390 [ 2428.817661] ? start_this_handle+0xd57/0x1390 [ 2428.818389] create_page_buffers+0x1bb/0x230 [ 2428.819095] __block_write_begin_int+0x1d1/0x19c0 [ 2428.819865] ? ext4_da_release_space+0x480/0x480 [ 2428.820630] ? kmem_cache_alloc+0x2a6/0x310 [ 2428.821328] ? remove_inode_buffers+0x300/0x300 09:32:43 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000500)={{}, {0xfd2}, 0x33, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)="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", 0x123, 0x0, &(0x7f0000000280)={0x2, 0x163, {0x0, 0xc, 0x72, "b39806a274660ecbc244c1e6fa0356a5a5fa43e7c2e1649bb92e745c20c7fade00350626a1bdd0d0cb4d607be832744c5767a47749cc475e6278c996b39739b558b6af80fa1d80dd3d1d31a097f89d587389de1ae3aeab216943d62e3f528c716649573af4c2956d8e0bf567a26fbf5f7ea3", 0xe4, "f5c89ba5fdcf6f27fcb95b62363c3ca55f1fb0e58b19cd6ac7b8ffb84805f9d5bce939a3c48c2cec99eacb55efdf6122613f5b4b621da33bf5f84452c1272f327ac2f08d8426e8130cbb2d3a1ae3736640fe3c1c232698b199ae31a11c7a435be36725421de03a3eece6877c2c0a262571d3558b05eeef1bbce4229ee59baa1ac1ace24b41165735f80d3299f55f9bcf6c8ab74a88f9f5dedb3a229989ce34ad761fa995467d75ecee269277ef2d501f0883a5748bd1c3bfd808ed2fd3292aec7c384262e70457312da13435caac813bf0be67e6b642aced54860dbbd8aa5959f668a391"}, 0xd4, "66b432238bbb7e627427e1de654df4e98d2e4c2ffbf704a9875bda621ec79f8404db71d6b0df239a08225eff8910da12f4030e1a5bcbc21a5a8623ec6d0a017674262d8ef4f410a8a39b7d18a9d34548e8573e19388230865c8ba7fb5d93d72e844b63140913a52ed82b85669c2a3ac541937cd241ab1c18238f1e06fd6073a2c1ef181f3c020cd02c4600844302785f38a895bb231f5c50238f357f7d0c0249a30470d3ef4f1e3763e5406f878d0154470e2bc035635b5a02a997d09fdc4e1eb1444a6a44063c076d401e31fabbba691ba918e1"}, 0x243}) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) [ 2428.822073] ? jbd2__journal_start+0xf3/0x7e0 [ 2428.822979] ext4_da_write_begin+0x37d/0xd40 [ 2428.823681] ? ext4_write_begin+0x10f0/0x10f0 [ 2428.824375] ? copyout_mc+0x140/0x140 [ 2428.824962] generic_perform_write+0x20a/0x4f0 [ 2428.825685] ? page_cache_prev_miss+0x310/0x310 [ 2428.826404] ? down_write_killable+0x180/0x180 [ 2428.827099] ext4_buffered_write_iter+0x232/0x4a0 [ 2428.827834] ext4_file_write_iter+0xc11/0x18d0 [ 2428.828538] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2428.829228] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2428.830030] new_sync_write+0x42c/0x660 [ 2428.830658] ? new_sync_read+0x6f0/0x6f0 [ 2428.831273] ? ksys_write+0x12d/0x260 [ 2428.831852] ? lock_release+0x680/0x680 [ 2428.832450] ? selinux_file_permission+0x92/0x520 [ 2428.833178] ? __fget_files+0x296/0x4c0 [ 2428.833786] vfs_write+0x747/0xa70 [ 2428.834338] ksys_write+0x12d/0x260 [ 2428.834891] ? __ia32_sys_read+0xb0/0xb0 [ 2428.835515] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2428.836299] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2428.837074] do_syscall_64+0x33/0x40 [ 2428.837775] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2428.838584] RIP: 0033:0x7f1b43d12b19 [ 2428.839149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2428.841998] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2428.843139] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2428.844208] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2428.845253] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2428.846326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2428.847401] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:32:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 79) [ 2429.026492] FAULT_INJECTION: forcing a failure. [ 2429.026492] name failslab, interval 1, probability 0, space 0, times 0 [ 2429.029104] CPU: 0 PID: 11570 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2429.030213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2429.031500] Call Trace: [ 2429.031933] dump_stack+0x107/0x167 [ 2429.032490] should_fail.cold+0x5/0xa [ 2429.033069] ? create_object.isra.0+0x3a/0xa20 [ 2429.033789] should_failslab+0x5/0x20 [ 2429.034372] kmem_cache_alloc+0x5b/0x310 [ 2429.035026] create_object.isra.0+0x3a/0xa20 [ 2429.035709] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2429.036530] kmem_cache_alloc+0x159/0x310 [ 2429.037168] alloc_buffer_head+0x20/0x110 [ 2429.037848] alloc_page_buffers+0x14d/0x700 [ 2429.038524] create_empty_buffers+0x2c/0x640 [ 2429.039218] ? start_this_handle+0xfdd/0x1390 [ 2429.039898] ? start_this_handle+0xd57/0x1390 [ 2429.040615] create_page_buffers+0x1bb/0x230 [ 2429.041281] __block_write_begin_int+0x1d1/0x19c0 [ 2429.042053] ? ext4_da_release_space+0x480/0x480 [ 2429.042777] ? kmem_cache_alloc+0x2a6/0x310 [ 2429.043474] ? remove_inode_buffers+0x300/0x300 [ 2429.044188] ? jbd2__journal_start+0xf3/0x7e0 [ 2429.044932] ext4_da_write_begin+0x37d/0xd40 [ 2429.045613] ? ext4_write_begin+0x10f0/0x10f0 [ 2429.046325] ? copyout_mc+0x140/0x140 [ 2429.046916] generic_perform_write+0x20a/0x4f0 [ 2429.047635] ? page_cache_prev_miss+0x310/0x310 [ 2429.048350] ? down_write_killable+0x180/0x180 [ 2429.049087] ext4_buffered_write_iter+0x232/0x4a0 [ 2429.049820] ext4_file_write_iter+0xc11/0x18d0 [ 2429.050530] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2429.051221] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2429.052040] new_sync_write+0x42c/0x660 [ 2429.052642] ? new_sync_read+0x6f0/0x6f0 [ 2429.053314] ? ksys_write+0x12d/0x260 [ 2429.053906] ? lock_release+0x680/0x680 [ 2429.054537] ? selinux_file_permission+0x92/0x520 [ 2429.055265] ? __fget_files+0x296/0x4c0 [ 2429.055907] vfs_write+0x747/0xa70 [ 2429.056464] ksys_write+0x12d/0x260 [ 2429.057044] ? __ia32_sys_read+0xb0/0xb0 [ 2429.057672] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2429.058516] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2429.059294] do_syscall_64+0x33/0x40 [ 2429.059883] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2429.060667] RIP: 0033:0x7f8c54bcdb19 [ 2429.061254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2429.063999] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2429.065142] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2429.066211] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2429.067275] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2429.068341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2429.069404] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:32:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 80) 09:32:56 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100005) 09:32:56 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:32:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 74) [ 2442.558177] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:32:56 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x80, 0x134880) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004e80)=[{{&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000023c0)=[{&(0x7f0000000140)=""/201, 0xc9}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/9, 0x9}, {&(0x7f0000001240)=""/31, 0x1f}, {&(0x7f0000001280)=""/70, 0x46}, {&(0x7f0000001300)}, {&(0x7f0000001340)=""/44, 0x2c}, {&(0x7f0000001380)=""/40, 0x28}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x9, &(0x7f0000002480)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f00000024c0), 0x6e, &(0x7f0000003880)=[{&(0x7f0000002540)=""/17, 0x11}, {&(0x7f0000002580)=""/165, 0xa5}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000003640)=""/168, 0xa8}, {&(0x7f0000003700)=""/208, 0xd0}, {&(0x7f0000003800)=""/113, 0x71}], 0x6, &(0x7f0000003900)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f00000039c0)=@abs, 0x6e, &(0x7f0000004d40)=[{&(0x7f0000003a40)=""/4096, 0x1000}, {&(0x7f0000004a40)=""/57, 0x39}, {&(0x7f0000004a80)=""/27, 0x1b}, {&(0x7f0000004ac0)=""/170, 0xaa}, {&(0x7f0000004b80)=""/159, 0x9f}, {&(0x7f0000004c40)=""/193, 0xc1}], 0x6, &(0x7f0000004dc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x90}}], 0x3, 0x43, &(0x7f0000004f40)={0x77359400}) fchown(r0, r1, 0xee01) 09:32:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 92) 09:32:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 75) 09:32:56 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e", 0x9f, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2442.600179] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2442.612581] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2442.617813] FAULT_INJECTION: forcing a failure. [ 2442.617813] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2442.619620] CPU: 1 PID: 11587 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2442.620645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.621871] Call Trace: [ 2442.622302] dump_stack+0x107/0x167 [ 2442.622852] should_fail.cold+0x5/0xa [ 2442.623428] __alloc_pages_nodemask+0x182/0x600 [ 2442.624127] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2442.625019] ? find_get_entry+0x2c8/0x740 [ 2442.625632] ? vmacache_find+0x55/0x2a0 [ 2442.626267] alloc_pages_current+0x187/0x280 [ 2442.626925] __page_cache_alloc+0x2d2/0x360 [ 2442.627562] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.628343] pagecache_get_page+0x2c7/0xc80 [ 2442.628981] ? asm_exc_page_fault+0x1e/0x30 [ 2442.629616] grab_cache_page_write_begin+0x64/0xa0 [ 2442.630367] ext4_da_write_begin+0x2f3/0xd40 [ 2442.631021] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2442.631787] ? ext4_write_begin+0x10f0/0x10f0 [ 2442.632441] ? copyout_mc+0x140/0x140 [ 2442.633012] generic_perform_write+0x20a/0x4f0 [ 2442.633694] ? page_cache_prev_miss+0x310/0x310 [ 2442.634401] ? down_write_killable+0x180/0x180 [ 2442.635096] ext4_buffered_write_iter+0x232/0x4a0 [ 2442.635821] ext4_file_write_iter+0xc11/0x18d0 [ 2442.636508] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2442.637188] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2442.637971] new_sync_write+0x42c/0x660 [ 2442.638603] ? new_sync_read+0x6f0/0x6f0 [ 2442.639201] ? ksys_write+0x12d/0x260 [ 2442.639763] ? lock_release+0x680/0x680 [ 2442.640354] ? selinux_file_permission+0x92/0x520 [ 2442.641074] ? __fget_files+0x296/0x4c0 [ 2442.641669] vfs_write+0x747/0xa70 [ 2442.642231] ksys_write+0x12d/0x260 [ 2442.642771] ? __ia32_sys_read+0xb0/0xb0 [ 2442.643368] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.644139] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.644896] do_syscall_64+0x33/0x40 [ 2442.645448] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2442.646222] RIP: 0033:0x7fcf10a65b19 [ 2442.646777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.649453] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2442.650599] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2442.651646] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2442.652690] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.653731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.654794] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 09:32:56 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100006) [ 2442.678621] FAULT_INJECTION: forcing a failure. [ 2442.678621] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.680577] CPU: 1 PID: 11583 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2442.681598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.682834] Call Trace: [ 2442.683231] dump_stack+0x107/0x167 [ 2442.683776] should_fail.cold+0x5/0xa [ 2442.684341] ? create_object.isra.0+0x3a/0xa20 [ 2442.685017] should_failslab+0x5/0x20 [ 2442.685585] kmem_cache_alloc+0x5b/0x310 [ 2442.686215] create_object.isra.0+0x3a/0xa20 [ 2442.686873] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2442.687627] kmem_cache_alloc+0x159/0x310 [ 2442.688247] alloc_buffer_head+0x20/0x110 [ 2442.688852] alloc_page_buffers+0x14d/0x700 [ 2442.689496] create_empty_buffers+0x2c/0x640 [ 2442.690153] ? start_this_handle+0xfdd/0x1390 [ 2442.690826] ? start_this_handle+0xd57/0x1390 [ 2442.691489] create_page_buffers+0x1bb/0x230 [ 2442.692144] __block_write_begin_int+0x1d1/0x19c0 [ 2442.692865] ? ext4_da_release_space+0x480/0x480 [ 2442.693584] ? kmem_cache_alloc+0x2a6/0x310 [ 2442.694253] ? remove_inode_buffers+0x300/0x300 [ 2442.694932] ? jbd2__journal_start+0xf3/0x7e0 [ 2442.695613] ext4_da_write_begin+0x37d/0xd40 [ 2442.696270] ? ext4_write_begin+0x10f0/0x10f0 [ 2442.696925] ? copyout_mc+0x140/0x140 [ 2442.697496] generic_perform_write+0x20a/0x4f0 [ 2442.698200] ? page_cache_prev_miss+0x310/0x310 [ 2442.698931] ? down_write_killable+0x180/0x180 [ 2442.699643] ext4_buffered_write_iter+0x232/0x4a0 [ 2442.700372] ext4_file_write_iter+0xc11/0x18d0 [ 2442.701062] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2442.701734] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2442.702537] new_sync_write+0x42c/0x660 [ 2442.703127] ? new_sync_read+0x6f0/0x6f0 [ 2442.703722] ? ksys_write+0x12d/0x260 [ 2442.704289] ? lock_release+0x680/0x680 [ 2442.704871] ? selinux_file_permission+0x92/0x520 [ 2442.705591] ? __fget_files+0x296/0x4c0 [ 2442.706221] vfs_write+0x747/0xa70 [ 2442.706757] ksys_write+0x12d/0x260 [ 2442.707297] ? __ia32_sys_read+0xb0/0xb0 [ 2442.707324] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2442.707898] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.707924] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.710801] do_syscall_64+0x33/0x40 [ 2442.711350] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2442.712094] RIP: 0033:0x7f0fd57bab19 [ 2442.712642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.715343] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2442.716452] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2442.717492] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2442.718553] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.719593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.720632] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 09:32:56 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1b26}}, './file0\x00'}) mq_timedsend(r0, &(0x7f0000000040)="cf90cbe029a68498fdb526b1774e6adda730fd0cb4e96753c958fa5047cfc043a7d3edc302e7d04af37b0c6180806351a84474179bf4a7088fa05e4f62c7a0b734d417c3a948a80d603bc678e1b0fe78bd8f7940ad62b96fb6f6ff1ce73708c512fc46de88f804c13570bb828f898bc2ed699b79e34b00a9874a00b85e06e152baaeba05", 0x84, 0x2, &(0x7f0000000140)={0x0, 0x989680}) [ 2442.755401] FAULT_INJECTION: forcing a failure. [ 2442.755401] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.757297] CPU: 0 PID: 11588 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2442.758278] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.759441] Call Trace: [ 2442.759828] dump_stack+0x107/0x167 [ 2442.760344] should_fail.cold+0x5/0xa [ 2442.760893] ? create_object.isra.0+0x3a/0xa20 [ 2442.761543] should_failslab+0x5/0x20 [ 2442.762077] kmem_cache_alloc+0x5b/0x310 [ 2442.762657] ? lru_cache_add+0x45c/0x800 [ 2442.763238] create_object.isra.0+0x3a/0xa20 [ 2442.763862] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2442.764582] kmem_cache_alloc+0x159/0x310 [ 2442.765203] jbd2__journal_start+0x190/0x7e0 [ 2442.765838] __ext4_journal_start_sb+0x214/0x390 [ 2442.766531] ext4_da_write_begin+0x51f/0xd40 [ 2442.767161] ? ext4_write_begin+0x10f0/0x10f0 [ 2442.767791] ? copyout_mc+0x140/0x140 [ 2442.768346] generic_perform_write+0x20a/0x4f0 [ 2442.768999] ? page_cache_prev_miss+0x310/0x310 [ 2442.769653] ? down_write_killable+0x180/0x180 [ 2442.770322] ext4_buffered_write_iter+0x232/0x4a0 [ 2442.771009] ext4_file_write_iter+0xc11/0x18d0 [ 2442.771664] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2442.772319] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2442.773067] new_sync_write+0x42c/0x660 [ 2442.773633] ? new_sync_read+0x6f0/0x6f0 [ 2442.774224] ? ksys_write+0x12d/0x260 [ 2442.774765] ? lock_release+0x680/0x680 [ 2442.775324] ? selinux_file_permission+0x92/0x520 [ 2442.776014] ? __fget_files+0x296/0x4c0 [ 2442.776588] vfs_write+0x747/0xa70 [ 2442.777125] ksys_write+0x12d/0x260 [ 2442.777643] ? __ia32_sys_read+0xb0/0xb0 [ 2442.778241] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.778990] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.779727] do_syscall_64+0x33/0x40 [ 2442.780258] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2442.780971] RIP: 0033:0x7f1b43d12b19 [ 2442.781496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.784047] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2442.785112] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2442.786108] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2442.787124] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.788124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.789147] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 [ 2442.821728] FAULT_INJECTION: forcing a failure. [ 2442.821728] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.823789] CPU: 1 PID: 11589 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2442.824809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2442.826024] Call Trace: [ 2442.826450] dump_stack+0x107/0x167 [ 2442.826992] should_fail.cold+0x5/0xa [ 2442.827563] ? create_object.isra.0+0x3a/0xa20 [ 2442.828243] should_failslab+0x5/0x20 [ 2442.828804] kmem_cache_alloc+0x5b/0x310 [ 2442.829403] ? lru_cache_add+0x45c/0x800 [ 2442.830005] create_object.isra.0+0x3a/0xa20 [ 2442.830681] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2442.831438] kmem_cache_alloc+0x159/0x310 [ 2442.832057] jbd2__journal_start+0x190/0x7e0 [ 2442.832714] __ext4_journal_start_sb+0x214/0x390 [ 2442.833419] ext4_da_write_begin+0x51f/0xd40 [ 2442.834083] ? ext4_write_begin+0x10f0/0x10f0 [ 2442.834765] ? copyout_mc+0x140/0x140 [ 2442.835345] generic_perform_write+0x20a/0x4f0 [ 2442.836034] ? page_cache_prev_miss+0x310/0x310 [ 2442.836726] ? down_write_killable+0x180/0x180 [ 2442.837417] ext4_buffered_write_iter+0x232/0x4a0 [ 2442.838135] ext4_file_write_iter+0xc11/0x18d0 [ 2442.838858] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2442.839542] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2442.840330] new_sync_write+0x42c/0x660 [ 2442.840918] ? new_sync_read+0x6f0/0x6f0 [ 2442.841525] ? ksys_write+0x12d/0x260 [ 2442.842101] ? lock_release+0x680/0x680 [ 2442.842708] ? selinux_file_permission+0x92/0x520 [ 2442.843428] ? __fget_files+0x296/0x4c0 [ 2442.844038] vfs_write+0x747/0xa70 [ 2442.844570] ksys_write+0x12d/0x260 [ 2442.845112] ? __ia32_sys_read+0xb0/0xb0 [ 2442.845720] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2442.846520] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2442.847285] do_syscall_64+0x33/0x40 [ 2442.847835] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2442.848591] RIP: 0033:0x7f8c54bcdb19 [ 2442.849148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2442.851848] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2442.852970] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2442.854013] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 09:32:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000000)=0x8, 0x4) [ 2442.855084] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2442.856352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2442.857390] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:32:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 76) 09:32:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 93) 09:32:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 75) [ 2442.999813] FAULT_INJECTION: forcing a failure. [ 2442.999813] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2443.001610] CPU: 1 PID: 11811 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2443.002637] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2443.003844] Call Trace: [ 2443.004239] dump_stack+0x107/0x167 [ 2443.004770] should_fail.cold+0x5/0xa [ 2443.005333] __alloc_pages_nodemask+0x182/0x600 [ 2443.006014] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2443.006920] ? find_get_entry+0x2c8/0x740 [ 2443.007520] ? vmacache_find+0x55/0x2a0 [ 2443.008115] alloc_pages_current+0x187/0x280 [ 2443.008755] __page_cache_alloc+0x2d2/0x360 [ 2443.009383] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2443.010158] pagecache_get_page+0x2c7/0xc80 [ 2443.010809] ? asm_exc_page_fault+0x1e/0x30 [ 2443.011448] grab_cache_page_write_begin+0x64/0xa0 [ 2443.012174] ext4_da_write_begin+0x2f3/0xd40 [ 2443.012811] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2443.013574] ? ext4_write_begin+0x10f0/0x10f0 [ 2443.014252] ? copyout_mc+0x140/0x140 [ 2443.014818] generic_perform_write+0x20a/0x4f0 [ 2443.015489] ? page_cache_prev_miss+0x310/0x310 [ 2443.016181] ? down_write_killable+0x180/0x180 [ 2443.016854] ext4_buffered_write_iter+0x232/0x4a0 [ 2443.017574] ext4_file_write_iter+0xc11/0x18d0 [ 2443.018290] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2443.018974] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2443.019745] new_sync_write+0x42c/0x660 [ 2443.020336] ? new_sync_read+0x6f0/0x6f0 [ 2443.020934] ? ksys_write+0x12d/0x260 [ 2443.021507] ? lock_release+0x680/0x680 [ 2443.022099] ? selinux_file_permission+0x92/0x520 [ 2443.022840] ? __fget_files+0x296/0x4c0 [ 2443.023432] vfs_write+0x747/0xa70 [ 2443.023979] ksys_write+0x12d/0x260 [ 2443.024044] FAULT_INJECTION: forcing a failure. [ 2443.024044] name failslab, interval 1, probability 0, space 0, times 0 [ 2443.024510] ? __ia32_sys_read+0xb0/0xb0 [ 2443.024536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2443.024563] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2443.028279] do_syscall_64+0x33/0x40 [ 2443.028823] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2443.029575] RIP: 0033:0x7fcf10a65b19 [ 2443.030128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2443.032831] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2443.033934] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2443.035010] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2443.036055] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2443.037102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.038174] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2443.039261] CPU: 0 PID: 11810 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2443.040308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2443.041515] Call Trace: [ 2443.041916] dump_stack+0x107/0x167 [ 2443.042470] should_fail.cold+0x5/0xa [ 2443.043045] ? create_object.isra.0+0x3a/0xa20 [ 2443.043712] should_failslab+0x5/0x20 [ 2443.044292] kmem_cache_alloc+0x5b/0x310 [ 2443.044908] create_object.isra.0+0x3a/0xa20 [ 2443.045569] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2443.046338] kmem_cache_alloc+0x159/0x310 [ 2443.046981] alloc_buffer_head+0x20/0x110 [ 2443.047587] alloc_page_buffers+0x14d/0x700 [ 2443.048244] create_empty_buffers+0x2c/0x640 [ 2443.048902] ? start_this_handle+0xfdd/0x1390 [ 2443.049559] ? start_this_handle+0xd57/0x1390 [ 2443.050244] create_page_buffers+0x1bb/0x230 [ 2443.050902] __block_write_begin_int+0x1d1/0x19c0 [ 2443.051630] ? ext4_da_release_space+0x480/0x480 [ 2443.052344] ? kmem_cache_alloc+0x2a6/0x310 [ 2443.052996] ? remove_inode_buffers+0x300/0x300 [ 2443.053687] ? jbd2__journal_start+0xf3/0x7e0 [ 2443.054396] ext4_da_write_begin+0x37d/0xd40 [ 2443.055081] ? ext4_write_begin+0x10f0/0x10f0 [ 2443.055734] ? copyout_mc+0x140/0x140 [ 2443.056449] generic_perform_write+0x20a/0x4f0 [ 2443.057214] ? page_cache_prev_miss+0x310/0x310 [ 2443.057903] ? down_write_killable+0x180/0x180 [ 2443.058589] ext4_buffered_write_iter+0x232/0x4a0 [ 2443.059300] ext4_file_write_iter+0xc11/0x18d0 [ 2443.059999] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2443.060671] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2443.061455] new_sync_write+0x42c/0x660 [ 2443.062047] ? new_sync_read+0x6f0/0x6f0 [ 2443.062663] ? ksys_write+0x12d/0x260 [ 2443.063233] ? lock_release+0x680/0x680 [ 2443.063822] ? selinux_file_permission+0x92/0x520 [ 2443.064517] ? __fget_files+0x296/0x4c0 [ 2443.065116] vfs_write+0x747/0xa70 [ 2443.065637] ksys_write+0x12d/0x260 [ 2443.066179] ? __ia32_sys_read+0xb0/0xb0 [ 2443.066773] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2443.067536] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2443.068281] do_syscall_64+0x33/0x40 [ 2443.068823] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2443.069573] RIP: 0033:0x7f1b43d12b19 [ 2443.070129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2443.072735] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2443.073833] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2443.074879] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2443.075907] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2443.076937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.077971] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 [ 2443.111554] FAULT_INJECTION: forcing a failure. [ 2443.111554] name failslab, interval 1, probability 0, space 0, times 0 [ 2443.113432] CPU: 0 PID: 11813 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2443.114454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2443.115654] Call Trace: [ 2443.116049] dump_stack+0x107/0x167 [ 2443.116587] should_fail.cold+0x5/0xa [ 2443.117146] ? create_object.isra.0+0x3a/0xa20 [ 2443.117816] should_failslab+0x5/0x20 [ 2443.118382] kmem_cache_alloc+0x5b/0x310 [ 2443.118975] ? lru_cache_add+0x45c/0x800 [ 2443.119576] create_object.isra.0+0x3a/0xa20 [ 2443.120226] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2443.120974] kmem_cache_alloc+0x159/0x310 [ 2443.121588] jbd2__journal_start+0x190/0x7e0 [ 2443.122248] __ext4_journal_start_sb+0x214/0x390 [ 2443.122956] ext4_da_write_begin+0x51f/0xd40 [ 2443.123619] ? ext4_write_begin+0x10f0/0x10f0 [ 2443.124275] ? copyout_mc+0x140/0x140 [ 2443.124849] generic_perform_write+0x20a/0x4f0 [ 2443.125530] ? page_cache_prev_miss+0x310/0x310 [ 2443.126216] ? down_write_killable+0x180/0x180 [ 2443.126898] ext4_buffered_write_iter+0x232/0x4a0 [ 2443.127600] ext4_file_write_iter+0xc11/0x18d0 [ 2443.128286] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2443.128955] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2443.129733] new_sync_write+0x42c/0x660 [ 2443.130328] ? new_sync_read+0x6f0/0x6f0 [ 2443.130927] ? ksys_write+0x12d/0x260 [ 2443.131483] ? lock_release+0x680/0x680 [ 2443.132067] ? selinux_file_permission+0x92/0x520 [ 2443.132770] ? __fget_files+0x296/0x4c0 [ 2443.133370] vfs_write+0x747/0xa70 [ 2443.133894] ksys_write+0x12d/0x260 [ 2443.134449] ? __ia32_sys_read+0xb0/0xb0 [ 2443.135056] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2443.135825] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2443.136588] do_syscall_64+0x33/0x40 [ 2443.137154] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2443.137902] RIP: 0033:0x7f0fd57bab19 [ 2443.138460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2443.141120] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2443.142222] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2443.143258] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2443.144297] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2443.145339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.146391] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 09:33:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 76) 09:33:10 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:33:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 81) [ 2456.079715] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2456.087191] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2456.089101] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:33:10 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100007) 09:33:10 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28", 0xba, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:33:10 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000000)="f698ed4b4c1dbfc9ee1d20fff1403edcb498e33a8ec225e28b1e629676e55330e7e4f43c8c49ef973c1d2dae16977b27c2ed6a22fcbbec71dc03c043f2ed32019f8d3aaf39", 0x45, 0x3, &(0x7f0000000080)={0x0, 0x3938700}) 09:33:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 94) 09:33:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 77) [ 2456.127067] FAULT_INJECTION: forcing a failure. [ 2456.127067] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2456.127132] FAULT_INJECTION: forcing a failure. [ 2456.127132] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.128784] CPU: 0 PID: 11832 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2456.128797] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.128804] Call Trace: [ 2456.128827] dump_stack+0x107/0x167 [ 2456.128848] should_fail.cold+0x5/0xa [ 2456.128876] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2456.128912] generic_perform_write+0x279/0x4f0 [ 2456.128943] ? page_cache_prev_miss+0x310/0x310 [ 2456.128967] ? down_write_killable+0x180/0x180 [ 2456.129003] ext4_buffered_write_iter+0x232/0x4a0 [ 2456.136887] ext4_file_write_iter+0xc11/0x18d0 [ 2456.137578] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2456.138264] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.139056] new_sync_write+0x42c/0x660 [ 2456.139642] ? new_sync_read+0x6f0/0x6f0 [ 2456.140245] ? ksys_write+0x12d/0x260 [ 2456.140814] ? lock_release+0x680/0x680 [ 2456.141403] ? selinux_file_permission+0x92/0x520 [ 2456.142097] ? __fget_files+0x296/0x4c0 [ 2456.142700] vfs_write+0x747/0xa70 [ 2456.143238] ksys_write+0x12d/0x260 [ 2456.143783] ? __ia32_sys_read+0xb0/0xb0 [ 2456.144391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.145163] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.145924] do_syscall_64+0x33/0x40 [ 2456.146475] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2456.147235] RIP: 0033:0x7fcf10a65b19 [ 2456.147788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.150474] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2456.151547] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2456.152591] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2456.153638] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.154680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.155723] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2456.156804] CPU: 1 PID: 11823 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2456.157378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.158049] Call Trace: [ 2456.158281] dump_stack+0x107/0x167 [ 2456.158587] should_fail.cold+0x5/0xa [ 2456.158897] ? create_object.isra.0+0x3a/0xa20 [ 2456.159271] ? create_object.isra.0+0x3a/0xa20 [ 2456.159646] should_failslab+0x5/0x20 [ 2456.159961] kmem_cache_alloc+0x5b/0x310 [ 2456.160293] create_object.isra.0+0x3a/0xa20 [ 2456.160653] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2456.161068] kmem_cache_alloc+0x159/0x310 [ 2456.161410] alloc_buffer_head+0x20/0x110 [ 2456.161749] alloc_page_buffers+0x14d/0x700 [ 2456.162107] create_empty_buffers+0x2c/0x640 [ 2456.162473] ? start_this_handle+0xfdd/0x1390 [ 2456.162845] ? start_this_handle+0xd57/0x1390 [ 2456.163210] create_page_buffers+0x1bb/0x230 [ 2456.163573] __block_write_begin_int+0x1d1/0x19c0 [ 2456.163975] ? ext4_da_release_space+0x480/0x480 [ 2456.164356] ? kmem_cache_alloc+0x2a6/0x310 [ 2456.164710] ? remove_inode_buffers+0x300/0x300 [ 2456.165085] ? jbd2__journal_start+0xf3/0x7e0 [ 2456.165452] ext4_da_write_begin+0x37d/0xd40 [ 2456.165818] ? ext4_write_begin+0x10f0/0x10f0 [ 2456.166179] ? copyout_mc+0x140/0x140 [ 2456.166507] generic_perform_write+0x20a/0x4f0 [ 2456.167057] ? page_cache_prev_miss+0x310/0x310 [ 2456.167437] ? down_write_killable+0x180/0x180 [ 2456.167811] ext4_buffered_write_iter+0x232/0x4a0 [ 2456.168213] ext4_file_write_iter+0xc11/0x18d0 [ 2456.168591] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2456.168973] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.169406] new_sync_write+0x42c/0x660 [ 2456.169730] ? new_sync_read+0x6f0/0x6f0 [ 2456.170066] ? ksys_write+0x12d/0x260 [ 2456.170388] ? lock_release+0x680/0x680 [ 2456.170712] ? selinux_file_permission+0x92/0x520 [ 2456.171108] ? __fget_files+0x296/0x4c0 [ 2456.171432] vfs_write+0x747/0xa70 [ 2456.171724] ksys_write+0x12d/0x260 [ 2456.172026] ? __ia32_sys_read+0xb0/0xb0 [ 2456.172361] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.172779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.173206] do_syscall_64+0x33/0x40 [ 2456.173504] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2456.173920] RIP: 0033:0x7f8c54bcdb19 [ 2456.174227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.175703] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2456.176326] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2456.176911] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2456.177486] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.178063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.178646] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2456.193484] FAULT_INJECTION: forcing a failure. [ 2456.193484] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.194497] CPU: 1 PID: 11836 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2456.195073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.195745] Call Trace: [ 2456.195963] dump_stack+0x107/0x167 [ 2456.196262] should_fail.cold+0x5/0xa [ 2456.196574] ? jbd2__journal_start+0x190/0x7e0 [ 2456.196958] should_failslab+0x5/0x20 [ 2456.197268] kmem_cache_alloc+0x5b/0x310 [ 2456.197601] jbd2__journal_start+0x190/0x7e0 [ 2456.197967] __ext4_journal_start_sb+0x214/0x390 [ 2456.198363] ext4_da_write_begin+0x51f/0xd40 [ 2456.198726] ? ext4_write_begin+0x10f0/0x10f0 [ 2456.199089] ? copyout_mc+0x140/0x140 [ 2456.199406] generic_perform_write+0x20a/0x4f0 [ 2456.199782] ? page_cache_prev_miss+0x310/0x310 [ 2456.200170] ? ext4_generic_write_checks+0x11e/0x310 [ 2456.200583] ext4_buffered_write_iter+0x232/0x4a0 [ 2456.200980] ext4_file_write_iter+0xc11/0x18d0 [ 2456.201370] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2456.201789] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.202369] new_sync_write+0x42c/0x660 [ 2456.202697] ? new_sync_read+0x6f0/0x6f0 [ 2456.203037] ? ksys_write+0x12d/0x260 [ 2456.203351] ? lock_release+0x680/0x680 [ 2456.203679] ? selinux_file_permission+0x92/0x520 [ 2456.204073] ? __fget_files+0x296/0x4c0 [ 2456.204403] vfs_write+0x747/0xa70 [ 2456.204694] ksys_write+0x12d/0x260 [ 2456.204996] ? __ia32_sys_read+0xb0/0xb0 [ 2456.205331] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.205758] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.206183] do_syscall_64+0x33/0x40 [ 2456.206491] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2456.206904] RIP: 0033:0x7f1b43d12b19 [ 2456.207206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.208690] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2456.209310] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2456.209883] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2456.210460] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.211029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.211605] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:33:10 executing program 3: mq_open(&(0x7f0000000300)='<+-)]\x00\xb4\xbf\x9d\x91\x18tL\xdb)]f\xf6\x1eV\x15\xc8\xdc\xba\xe9\t!>\xf3o\xafK\xf8L?\xbd\xaa\x84\x9f\xcet\x1f\x03\xbc\xear\x12\xdc\xb0nm\xa1\xef\xba.L\xa3dn\xabD\xf3\x95\xb7E\xa8}\bL\xff\xb5Iz\xa6\xfe\xa7_g0\x10#\x89\f}\xff\x99\f\x017a\xb6\tt\x05\x89\xd7\xd1\x85U\xed\xe8\x8e\xb5\xfa\xae})\x05\xca\xefW\xe2\xaf\xe3\x1b\x8c\xe4\xb8\xad\x06\t\xef%,\x89\x89u\x1fR\xcf\xd4\x8f\xf1+t\xf0^Y0\xcds\xcf \xc0\x89c\xca\xf7h8R\xd4q\b\x88\x86K\xa7\x0fUm \xfaU}Y?_\xba\xda\x91\xf5\xfd\xd8{\xac\x11;\xeb(\xeb\xb0z:\x03v\x81`\xcf\x9f\xb9\x04\x00\x00\x00\x00\x00\x00\x00t\xbe1\x17\x9e\xf9\x13;\x81g\xba\xddz\x13\x0f\xc2U\xfc\b\x83S\x1b|\xd1U\x8f,\x12\xcb\xd9/!y\x94\x1c\x95*\xc2_\xd5\v3\x040\xae\xd1\xcd\xf7$T\xcc\'\xd2\xd1\xd4u\x91e-N\xcb\x02],\v\xe2\xa3\x04d\x87\xee\x8e?(Q\xf4\x97s\x9b^\xd5\xdcM\xb8\x97\xeeP\xce\xdcT\xe4\x1eo\x06\x91\x0e\xa3?.\x17h\xb7\xc7\x9a\x9en$\xc10?\x10\x1e\n0S\xfd\xcb\xef)\n\xdakt\xa0H\x9b\x80\x8b\xec\xc9\x9a\xde\x98^\ri{|]\x89k\xa8\a\x80bz\x06u\f\xd9s9^\xc7\xbd\x18\xdc{\x9d\x04,\xbe=2H\x1e\xdbo:\x1b\x1c\xef/\x01\x04F\xae\xd3HY`x\x06\xa0\xaeo*yd\"2\x11\xe28\xc4m\xb4m&(v\"\xed\xb4\xc5\x1fuFH\x94F\x81}P\xf3#%\xc0V\xde\xab\xba\x88\x87\xf8f\x866\x8c4N\xe4O\xd5\xb1\x93}\xda\x86|\x8f\xa4x\xb3U\x94\xc2 X\r|\xf4\xfcl\x96\x8d\xfa*.\x92\xeeE\xf3\x1c\xe7\xafZ?\"\x01\x9d\xf4\xb4\xb90]\xd0D\x86st\xf72\xb3\xe9\x8cN\xf2+2', 0x0, 0x82, 0x0) [ 2456.240165] FAULT_INJECTION: forcing a failure. [ 2456.240165] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.242088] CPU: 0 PID: 11834 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2456.243103] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.244315] Call Trace: [ 2456.244712] dump_stack+0x107/0x167 [ 2456.245245] should_fail.cold+0x5/0xa [ 2456.245807] ? create_object.isra.0+0x3a/0xa20 [ 2456.246481] should_failslab+0x5/0x20 [ 2456.247043] kmem_cache_alloc+0x5b/0x310 [ 2456.247632] ? lru_cache_add+0x45c/0x800 [ 2456.248230] create_object.isra.0+0x3a/0xa20 [ 2456.248874] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2456.249617] kmem_cache_alloc+0x159/0x310 [ 2456.250238] jbd2__journal_start+0x190/0x7e0 [ 2456.250906] __ext4_journal_start_sb+0x214/0x390 [ 2456.251607] ext4_da_write_begin+0x51f/0xd40 [ 2456.252261] ? ext4_write_begin+0x10f0/0x10f0 [ 2456.252910] ? copyout_mc+0x140/0x140 [ 2456.253491] generic_perform_write+0x20a/0x4f0 [ 2456.254177] ? page_cache_prev_miss+0x310/0x310 [ 2456.254875] ? down_write_killable+0x180/0x180 [ 2456.255553] ext4_buffered_write_iter+0x232/0x4a0 [ 2456.256264] ext4_file_write_iter+0xc11/0x18d0 [ 2456.256949] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2456.257626] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 09:33:10 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100048) [ 2456.258406] new_sync_write+0x42c/0x660 [ 2456.259177] ? new_sync_read+0x6f0/0x6f0 [ 2456.259783] ? ksys_write+0x12d/0x260 [ 2456.260346] ? lock_release+0x680/0x680 [ 2456.260944] ? selinux_file_permission+0x92/0x520 [ 2456.261651] ? __fget_files+0x296/0x4c0 [ 2456.262243] vfs_write+0x747/0xa70 [ 2456.262786] ksys_write+0x12d/0x260 [ 2456.263313] ? __ia32_sys_read+0xb0/0xb0 [ 2456.263903] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.264665] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.265417] do_syscall_64+0x33/0x40 [ 2456.265960] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2456.266725] RIP: 0033:0x7f0fd57bab19 [ 2456.267278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.269920] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2456.271045] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2456.272220] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2456.273251] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.274279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.275322] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 09:33:10 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) mq_notify(r0, &(0x7f0000000000)={0x0, 0x33, 0x4, @tid=0xffffffffffffffff}) [ 2456.293015] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:33:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 95) 09:33:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 78) 09:33:10 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000000)="ca79024e8e7ab59a2cdf225e4d27129f8ac7332397bc8c565150a6602d501b556dd2d9cb52421c2858faef8e4aa7ff2ae5d207155b9aca59a9ca98f631b21c8f0b3d8e5c0b50d60c92afd26c72267f366dc0cf0bf37046f3f94f470a20aae7e12934f906acf4d7481acc193971c66e67f555247d2dbe7ad407c4b546d1", 0x7d, 0x1, &(0x7f0000000080)={0x0, 0x989680}) 09:33:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 82) 09:33:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 77) 09:33:10 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:33:10 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28", 0xba, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:33:10 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x1000010004c) [ 2456.458363] FAULT_INJECTION: forcing a failure. [ 2456.458363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2456.460542] CPU: 0 PID: 11975 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2456.461558] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.462775] Call Trace: [ 2456.463171] dump_stack+0x107/0x167 [ 2456.463711] should_fail.cold+0x5/0xa [ 2456.464281] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2456.465087] generic_perform_write+0x279/0x4f0 [ 2456.465771] ? page_cache_prev_miss+0x310/0x310 [ 2456.466476] ? down_write_killable+0x180/0x180 [ 2456.466946] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2456.467173] ext4_buffered_write_iter+0x232/0x4a0 [ 2456.468572] ext4_file_write_iter+0xc11/0x18d0 [ 2456.469266] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2456.469946] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.470753] new_sync_write+0x42c/0x660 [ 2456.471346] ? new_sync_read+0x6f0/0x6f0 [ 2456.471946] ? ksys_write+0x12d/0x260 [ 2456.472514] ? lock_release+0x680/0x680 [ 2456.473110] ? selinux_file_permission+0x92/0x520 [ 2456.473834] ? __fget_files+0x296/0x4c0 [ 2456.474129] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2456.474430] vfs_write+0x747/0xa70 [ 2456.475727] ksys_write+0x12d/0x260 [ 2456.476267] ? __ia32_sys_read+0xb0/0xb0 [ 2456.476875] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.477644] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.478415] do_syscall_64+0x33/0x40 [ 2456.478964] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2456.479715] RIP: 0033:0x7fcf10a65b19 [ 2456.480268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.482949] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2456.484064] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2456.485118] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2456.486159] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.487208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.488250] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2456.515236] FAULT_INJECTION: forcing a failure. [ 2456.515236] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.516227] CPU: 1 PID: 11984 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2456.516785] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.517459] Call Trace: [ 2456.517685] dump_stack+0x107/0x167 [ 2456.517990] should_fail.cold+0x5/0xa [ 2456.518311] ? create_object.isra.0+0x3a/0xa20 [ 2456.518688] should_failslab+0x5/0x20 [ 2456.518999] kmem_cache_alloc+0x5b/0x310 [ 2456.519336] create_object.isra.0+0x3a/0xa20 [ 2456.519691] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2456.520106] kmem_cache_alloc+0x159/0x310 [ 2456.520448] alloc_buffer_head+0x20/0x110 [ 2456.520786] alloc_page_buffers+0x14d/0x700 [ 2456.521139] create_empty_buffers+0x2c/0x640 [ 2456.521494] ? start_this_handle+0xfdd/0x1390 [ 2456.521864] ? start_this_handle+0xd57/0x1390 [ 2456.522237] create_page_buffers+0x1bb/0x230 [ 2456.522465] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2456.522604] __block_write_begin_int+0x1d1/0x19c0 [ 2456.522620] ? ext4_da_release_space+0x480/0x480 [ 2456.522639] ? kmem_cache_alloc+0x2a6/0x310 [ 2456.524975] ? remove_inode_buffers+0x300/0x300 [ 2456.525351] ? jbd2__journal_start+0xf3/0x7e0 [ 2456.525721] ext4_da_write_begin+0x37d/0xd40 [ 2456.526085] ? ext4_write_begin+0x10f0/0x10f0 [ 2456.526461] ? copyout_mc+0x140/0x140 [ 2456.526774] generic_perform_write+0x20a/0x4f0 [ 2456.527148] ? page_cache_prev_miss+0x310/0x310 [ 2456.527527] ? down_write_killable+0x180/0x180 [ 2456.527904] ext4_buffered_write_iter+0x232/0x4a0 [ 2456.528301] ext4_file_write_iter+0xc11/0x18d0 [ 2456.528681] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2456.529059] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.529491] new_sync_write+0x42c/0x660 [ 2456.529813] ? new_sync_read+0x6f0/0x6f0 [ 2456.530143] ? ksys_write+0x12d/0x260 [ 2456.530460] ? lock_release+0x680/0x680 [ 2456.530782] ? selinux_file_permission+0x92/0x520 [ 2456.531180] ? __fget_files+0x296/0x4c0 [ 2456.531509] vfs_write+0x747/0xa70 [ 2456.531803] ksys_write+0x12d/0x260 [ 2456.532100] ? __ia32_sys_read+0xb0/0xb0 [ 2456.532437] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.532858] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.533275] do_syscall_64+0x33/0x40 [ 2456.533576] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2456.533988] RIP: 0033:0x7f8c54bcdb19 [ 2456.534292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.535773] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2456.536386] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2456.536961] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2456.537540] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.538111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.538688] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2456.541204] FAULT_INJECTION: forcing a failure. [ 2456.541204] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2456.542201] CPU: 1 PID: 11978 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2456.542776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.543436] Call Trace: [ 2456.543653] dump_stack+0x107/0x167 [ 2456.543960] should_fail.cold+0x5/0xa [ 2456.544284] __alloc_pages_nodemask+0x182/0x600 [ 2456.544672] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2456.545168] ? find_get_entry+0x2c8/0x740 [ 2456.545509] ? vmacache_find+0x55/0x2a0 [ 2456.545844] alloc_pages_current+0x187/0x280 [ 2456.546212] __page_cache_alloc+0x2d2/0x360 [ 2456.546570] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.546997] pagecache_get_page+0x2c7/0xc80 [ 2456.547349] ? asm_exc_page_fault+0x1e/0x30 [ 2456.547711] grab_cache_page_write_begin+0x64/0xa0 [ 2456.548121] ext4_da_write_begin+0x2f3/0xd40 [ 2456.548483] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2456.548907] ? ext4_write_begin+0x10f0/0x10f0 [ 2456.549268] ? copyout_mc+0x140/0x140 [ 2456.549588] generic_perform_write+0x20a/0x4f0 [ 2456.549966] ? page_cache_prev_miss+0x310/0x310 [ 2456.550356] ? down_write_killable+0x180/0x180 [ 2456.550742] ext4_buffered_write_iter+0x232/0x4a0 [ 2456.551145] ext4_file_write_iter+0xc11/0x18d0 [ 2456.551534] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2456.551911] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.552344] new_sync_write+0x42c/0x660 [ 2456.552669] ? new_sync_read+0x6f0/0x6f0 [ 2456.553003] ? ksys_write+0x12d/0x260 [ 2456.553312] ? lock_release+0x680/0x680 [ 2456.553637] ? selinux_file_permission+0x92/0x520 [ 2456.554031] ? __fget_files+0x296/0x4c0 [ 2456.554367] vfs_write+0x747/0xa70 [ 2456.554658] ksys_write+0x12d/0x260 [ 2456.554958] ? __ia32_sys_read+0xb0/0xb0 [ 2456.555290] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.555713] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.556132] do_syscall_64+0x33/0x40 [ 2456.556436] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2456.556847] RIP: 0033:0x7f1b43d12b19 [ 2456.557149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.558626] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2456.559249] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2456.559832] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2456.560417] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.560992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.561567] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:33:10 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) [ 2456.609188] FAULT_INJECTION: forcing a failure. [ 2456.609188] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.611225] CPU: 0 PID: 12057 Comm: syz-executor.4 Not tainted 5.10.215 #1 [ 2456.612239] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.613441] Call Trace: [ 2456.613840] dump_stack+0x107/0x167 [ 2456.614390] should_fail.cold+0x5/0xa [ 2456.614956] ? create_object.isra.0+0x3a/0xa20 [ 2456.615626] should_failslab+0x5/0x20 [ 2456.616190] kmem_cache_alloc+0x5b/0x310 09:33:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 96) [ 2456.616794] create_object.isra.0+0x3a/0xa20 [ 2456.617589] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2456.618347] kmem_cache_alloc+0x159/0x310 [ 2456.618957] alloc_buffer_head+0x20/0x110 [ 2456.619561] alloc_page_buffers+0x14d/0x700 [ 2456.620200] create_empty_buffers+0x2c/0x640 [ 2456.620843] ? start_this_handle+0xfdd/0x1390 [ 2456.621495] ? start_this_handle+0xd57/0x1390 [ 2456.622158] create_page_buffers+0x1bb/0x230 [ 2456.622817] __block_write_begin_int+0x1d1/0x19c0 [ 2456.623533] ? ext4_da_release_space+0x480/0x480 09:33:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 83) [ 2456.624233] ? kmem_cache_alloc+0x2a6/0x310 [ 2456.624912] ? remove_inode_buffers+0x300/0x300 [ 2456.625586] ? jbd2__journal_start+0xf3/0x7e0 [ 2456.626261] ext4_da_write_begin+0x37d/0xd40 [ 2456.626930] ? ext4_write_begin+0x10f0/0x10f0 [ 2456.627588] ? copyout_mc+0x140/0x140 [ 2456.628160] generic_perform_write+0x20a/0x4f0 [ 2456.628843] ? page_cache_prev_miss+0x310/0x310 [ 2456.629530] ? down_write_killable+0x180/0x180 [ 2456.630211] ext4_buffered_write_iter+0x232/0x4a0 [ 2456.630933] ext4_file_write_iter+0xc11/0x18d0 [ 2456.631619] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2456.632297] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.633074] new_sync_write+0x42c/0x660 [ 2456.633666] ? new_sync_read+0x6f0/0x6f0 [ 2456.634267] ? ksys_write+0x12d/0x260 [ 2456.634843] ? lock_release+0x680/0x680 [ 2456.635430] ? selinux_file_permission+0x92/0x520 [ 2456.636154] ? __fget_files+0x296/0x4c0 [ 2456.636748] vfs_write+0x747/0xa70 [ 2456.637282] ksys_write+0x12d/0x260 [ 2456.637821] ? __ia32_sys_read+0xb0/0xb0 [ 2456.638437] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.639204] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.639969] do_syscall_64+0x33/0x40 [ 2456.640518] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2456.641268] RIP: 0033:0x7f0fd57bab19 [ 2456.641815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.644478] RSP: 002b:00007f0fd2d30188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2456.645588] RAX: ffffffffffffffda RBX: 00007f0fd58cdf60 RCX: 00007f0fd57bab19 [ 2456.646632] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2456.647665] RBP: 00007f0fd2d301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.648701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.649735] R13: 00007ffcb27b4cdf R14: 00007f0fd2d30300 R15: 0000000000022000 [ 2456.657478] FAULT_INJECTION: forcing a failure. [ 2456.657478] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.658495] CPU: 1 PID: 12146 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2456.659060] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.659721] Call Trace: [ 2456.659942] dump_stack+0x107/0x167 [ 2456.660240] should_fail.cold+0x5/0xa [ 2456.660555] ? create_object.isra.0+0x3a/0xa20 [ 2456.660926] should_failslab+0x5/0x20 [ 2456.661235] kmem_cache_alloc+0x5b/0x310 [ 2456.661566] create_object.isra.0+0x3a/0xa20 [ 2456.661924] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2456.662346] kmem_cache_alloc+0x159/0x310 [ 2456.662690] alloc_buffer_head+0x20/0x110 [ 2456.663033] alloc_page_buffers+0x14d/0x700 [ 2456.663388] create_empty_buffers+0x2c/0x640 [ 2456.663748] ? start_this_handle+0xfdd/0x1390 [ 2456.664123] ? start_this_handle+0xd57/0x1390 [ 2456.664488] create_page_buffers+0x1bb/0x230 [ 2456.664851] __block_write_begin_int+0x1d1/0x19c0 [ 2456.665250] ? ext4_da_release_space+0x480/0x480 [ 2456.665634] ? kmem_cache_alloc+0x2a6/0x310 [ 2456.665987] ? remove_inode_buffers+0x300/0x300 [ 2456.666381] ? jbd2__journal_start+0xf3/0x7e0 [ 2456.666756] ext4_da_write_begin+0x37d/0xd40 [ 2456.667120] ? ext4_write_begin+0x10f0/0x10f0 [ 2456.667483] ? copyout_mc+0x140/0x140 [ 2456.667804] generic_perform_write+0x20a/0x4f0 [ 2456.668179] ? page_cache_prev_miss+0x310/0x310 [ 2456.668559] ? down_write_killable+0x180/0x180 [ 2456.668934] ext4_buffered_write_iter+0x232/0x4a0 [ 2456.669326] ext4_file_write_iter+0xc11/0x18d0 [ 2456.669709] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2456.670086] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.670523] new_sync_write+0x42c/0x660 [ 2456.670847] ? new_sync_read+0x6f0/0x6f0 [ 2456.671175] ? ksys_write+0x12d/0x260 [ 2456.671484] ? lock_release+0x680/0x680 [ 2456.671808] ? selinux_file_permission+0x92/0x520 [ 2456.672199] ? __fget_files+0x296/0x4c0 [ 2456.672529] vfs_write+0x747/0xa70 [ 2456.672827] ksys_write+0x12d/0x260 [ 2456.673123] ? __ia32_sys_read+0xb0/0xb0 [ 2456.673454] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.673877] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.674297] do_syscall_64+0x33/0x40 [ 2456.674608] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2456.675030] RIP: 0033:0x7fcf10a65b19 [ 2456.675335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.676821] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2456.677442] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2456.678021] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2456.678603] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.679175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.679753] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2456.690363] FAULT_INJECTION: forcing a failure. [ 2456.690363] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.691354] CPU: 1 PID: 12171 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2456.691918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.692592] Call Trace: [ 2456.692812] dump_stack+0x107/0x167 [ 2456.693117] should_fail.cold+0x5/0xa [ 2456.693425] ? create_object.isra.0+0x3a/0xa20 [ 2456.693802] should_failslab+0x5/0x20 [ 2456.694113] kmem_cache_alloc+0x5b/0x310 [ 2456.694450] ? lru_cache_add+0x45c/0x800 [ 2456.694786] create_object.isra.0+0x3a/0xa20 [ 2456.695144] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2456.695561] kmem_cache_alloc+0x159/0x310 [ 2456.695909] jbd2__journal_start+0x190/0x7e0 [ 2456.696271] __ext4_journal_start_sb+0x214/0x390 [ 2456.696672] ext4_da_write_begin+0x51f/0xd40 [ 2456.697036] ? ext4_write_begin+0x10f0/0x10f0 [ 2456.697398] ? copyout_mc+0x140/0x140 [ 2456.697716] generic_perform_write+0x20a/0x4f0 [ 2456.698095] ? page_cache_prev_miss+0x310/0x310 [ 2456.698482] ? down_write_killable+0x180/0x180 [ 2456.698860] ext4_buffered_write_iter+0x232/0x4a0 [ 2456.699256] ext4_file_write_iter+0xc11/0x18d0 [ 2456.699633] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2456.700009] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2456.700441] new_sync_write+0x42c/0x660 [ 2456.700771] ? new_sync_read+0x6f0/0x6f0 [ 2456.701099] ? ksys_write+0x12d/0x260 [ 2456.701412] ? lock_release+0x680/0x680 [ 2456.701740] ? selinux_file_permission+0x92/0x520 [ 2456.702148] ? __fget_files+0x296/0x4c0 [ 2456.702488] vfs_write+0x747/0xa70 [ 2456.702792] ksys_write+0x12d/0x260 [ 2456.703094] ? __ia32_sys_read+0xb0/0xb0 [ 2456.703425] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.703853] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.704277] do_syscall_64+0x33/0x40 [ 2456.704578] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2456.704994] RIP: 0033:0x7f8c54bcdb19 [ 2456.705301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.706782] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2456.707396] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2456.707967] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2456.708542] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.709117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.709695] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2469.010157] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:33:23 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000140)={0x3, 0x10001, @status={[0x5, 0x5, 0xffffffffffffff80, 0x902, 0xfffffffffffff800, 0x70497e32]}, [0x1000, 0x0, 0x0, 0x2, 0xef, 0x7, 0x200, 0x3, 0x7e1183d3, 0x1, 0x646b4f67, 0x2, 0x4, 0x2, 0x7, 0x7, 0x1, 0x64, 0x0, 0x8a6e, 0x6a, 0x0, 0x401, 0x0, 0x6, 0xe7, 0x380ec392, 0x400, 0x101, 0x8, 0x0, 0xb0eb262, 0x3f, 0x8, 0x1, 0x4, 0xfff, 0x100, 0x5, 0x7, 0x8, 0x6, 0x0, 0xfffffffffffffff9, 0x101, 0x8, 0x8, 0x8, 0x1ff, 0x64d40fc000000000, 0x2, 0x4, 0x1f, 0x100000000, 0x4, 0x1000, 0x7, 0x7, 0xfffffffffffffff8, 0x401, 0x3, 0x7, 0x0, 0x40]}) 09:33:23 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28", 0xba, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:33:23 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:33:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 97) 09:33:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 84) 09:33:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 79) 09:33:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 78) 09:33:23 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100068) [ 2469.035232] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2469.053104] FAULT_INJECTION: forcing a failure. [ 2469.053104] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2469.054934] CPU: 1 PID: 12191 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2469.055945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2469.057166] Call Trace: [ 2469.057570] dump_stack+0x107/0x167 [ 2469.058118] should_fail.cold+0x5/0xa [ 2469.058703] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2469.059497] generic_perform_write+0x279/0x4f0 [ 2469.060188] ? page_cache_prev_miss+0x310/0x310 [ 2469.060882] ? down_write_killable+0x180/0x180 [ 2469.061571] ext4_buffered_write_iter+0x232/0x4a0 [ 2469.062291] ext4_file_write_iter+0xc11/0x18d0 [ 2469.062993] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2469.063671] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2469.064417] new_sync_write+0x42c/0x660 [ 2469.065017] ? new_sync_read+0x6f0/0x6f0 [ 2469.065601] ? ksys_write+0x12d/0x260 [ 2469.066165] ? lock_release+0x680/0x680 [ 2469.066743] ? selinux_file_permission+0x92/0x520 [ 2469.067470] ? __fget_files+0x296/0x4c0 [ 2469.068057] vfs_write+0x747/0xa70 [ 2469.068602] ksys_write+0x12d/0x260 [ 2469.069130] ? __ia32_sys_read+0xb0/0xb0 [ 2469.069732] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2469.070479] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2469.071240] do_syscall_64+0x33/0x40 [ 2469.071779] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2469.072542] RIP: 0033:0x7fcf10a65b19 [ 2469.073079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2469.074517] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2469.075751] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2469.075773] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2469.075785] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2469.075796] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2469.075815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2469.082480] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 09:33:23 executing program 3: mq_open(&(0x7f0000000140)='-\t\x88\xcej\xdc)\x8c7\x12<\xf2`9\x1a\xd6\xedL\xccbX\xc0X\x91\xde\xf8\x95\xde\xf2\xbb\xf5\x9d\xc6#\x86\xe43Y\xa9n\x1ct\x99N\'\x9cTh\x02d\xda\v\x02\x1b\x83\x82@[\xbc\"\x1dfs\x1e\xd0q\xcb\x15hJ5\x94\x9ex\xbb\xe5\xd7]d\xfas\xffr\xcb\x9b6(\xc9\x11\x93t\xd2\xfc\x86\xaeG\x9e\x8d\xb1`\xf4\xc8:\xbf\x06\x00\x00\x00|\xd9\xa2\x89eP\xf7\x8bH\xc3x\n\xac\x94\xfb\xd2\x1f\xb6\x00\x8aFK\x97\xd44\xf5&\xdee\x9cOfm\xc9}7\xaaxQ\xb9\x96\x9d!p\xe6N\xa0\xb6\x98U(E\xf7\xd6rM\xa6\x81\xff\x02ph\x1c\x7fu(\xa0q\xbb|\xba@2]\x0e\xba\x8fc\xb1\xd5\xff\xe3w\a\x8aq\xd5\x05\xe5\x8fY\x02ACY\x15\xa2}\x83\xc3t\x1a\x9e\x02\xe7\'\x88\xd0N\xd8\x11\xf1k\xdb\x17\x95\xa2\x13\x1e\x18\a\xea.\x8fe.)\x03\xf7\xde\n> \xde@\f\xb5\xef\xc3\xf8\aId\x01\x91\xd6\xd5!E]\xa6p\xe5q\xa9\x7f\xd2>\x93y`\xf9\x85\xd1\x88J2\al#\xac\x87i\x9c\x02\xfa}\xbeL\xb2\x1e\xc2&\xfdYV\x19;R\x8d\xb1\xe9y\xd3|\x8a', 0x0, 0x21, 0x0) [ 2469.115313] FAULT_INJECTION: forcing a failure. [ 2469.115313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2469.117357] CPU: 1 PID: 12194 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2469.118379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2469.119561] Call Trace: [ 2469.119956] dump_stack+0x107/0x167 [ 2469.120478] should_fail.cold+0x5/0xa [ 2469.121050] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2469.121814] generic_perform_write+0x279/0x4f0 [ 2469.122507] ? page_cache_prev_miss+0x310/0x310 [ 2469.123170] ? down_write_killable+0x180/0x180 [ 2469.123856] ext4_buffered_write_iter+0x232/0x4a0 [ 2469.124543] ext4_file_write_iter+0xc11/0x18d0 [ 2469.125231] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2469.125880] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2469.126671] new_sync_write+0x42c/0x660 [ 2469.127240] ? new_sync_read+0x6f0/0x6f0 [ 2469.127842] ? ksys_write+0x12d/0x260 [ 2469.128384] ? lock_release+0x680/0x680 [ 2469.128969] ? selinux_file_permission+0x92/0x520 [ 2469.129660] ? __fget_files+0x296/0x4c0 [ 2469.130254] vfs_write+0x747/0xa70 [ 2469.130783] ksys_write+0x12d/0x260 [ 2469.131325] ? __ia32_sys_read+0xb0/0xb0 [ 2469.131910] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2469.132678] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2469.133412] do_syscall_64+0x33/0x40 [ 2469.133961] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2469.134694] RIP: 0033:0x7f1b43d12b19 [ 2469.135244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2469.137800] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2469.138924] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2469.139928] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2469.140924] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2469.141923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2469.142929] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 [ 2469.162645] FAULT_INJECTION: forcing a failure. [ 2469.162645] name failslab, interval 1, probability 0, space 0, times 0 [ 2469.164696] CPU: 1 PID: 12190 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2469.165673] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2469.166853] Call Trace: [ 2469.167228] dump_stack+0x107/0x167 [ 2469.167748] should_fail.cold+0x5/0xa [ 2469.168294] ? create_object.isra.0+0x3a/0xa20 [ 2469.168946] should_failslab+0x5/0x20 [ 2469.169486] kmem_cache_alloc+0x5b/0x310 [ 2469.170104] create_object.isra.0+0x3a/0xa20 [ 2469.170744] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2469.171499] kmem_cache_alloc+0x159/0x310 [ 2469.172106] alloc_buffer_head+0x20/0x110 [ 2469.172718] alloc_page_buffers+0x14d/0x700 [ 2469.173341] create_empty_buffers+0x2c/0x640 [ 2469.173990] ? start_this_handle+0xfdd/0x1390 [ 2469.174626] ? start_this_handle+0xd57/0x1390 [ 2469.175290] create_page_buffers+0x1bb/0x230 [ 2469.175918] __block_write_begin_int+0x1d1/0x19c0 [ 2469.176632] ? ext4_da_release_space+0x480/0x480 [ 2469.177315] ? kmem_cache_alloc+0x2a6/0x310 [ 2469.177957] ? remove_inode_buffers+0x300/0x300 [ 2469.178765] ? jbd2__journal_start+0xf3/0x7e0 [ 2469.179447] ext4_da_write_begin+0x37d/0xd40 [ 2469.180085] ? ext4_write_begin+0x10f0/0x10f0 [ 2469.180738] ? copyout_mc+0x140/0x140 [ 2469.181292] generic_perform_write+0x20a/0x4f0 [ 2469.181971] ? page_cache_prev_miss+0x310/0x310 [ 2469.182666] ? down_write_killable+0x180/0x180 [ 2469.183354] ext4_buffered_write_iter+0x232/0x4a0 [ 2469.184046] ext4_file_write_iter+0xc11/0x18d0 [ 2469.184735] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2469.185388] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2469.186167] new_sync_write+0x42c/0x660 [ 2469.186747] ? new_sync_read+0x6f0/0x6f0 [ 2469.187345] ? ksys_write+0x12d/0x260 [ 2469.187892] ? lock_release+0x680/0x680 [ 2469.188473] ? selinux_file_permission+0x92/0x520 [ 2469.189160] ? __fget_files+0x296/0x4c0 [ 2469.189758] vfs_write+0x747/0xa70 [ 2469.190272] ksys_write+0x12d/0x260 [ 2469.190821] ? __ia32_sys_read+0xb0/0xb0 [ 2469.191398] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2469.192170] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2469.192910] do_syscall_64+0x33/0x40 [ 2469.193461] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2469.194182] RIP: 0033:0x7f8c54bcdb19 [ 2469.194736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2469.197290] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2469.198402] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2469.199412] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2469.200405] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2469.201404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2469.202405] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:33:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:33:36 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) copy_file_range(r2, &(0x7f0000001140)=0x200, 0xffffffffffffffff, &(0x7f0000001180)=0x4, 0xe71, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) r8 = socket$inet(0x2, 0x1, 0x4) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f0000000080)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x9, &(0x7f0000000040)=[r8], 0x1, 0x0, 0x0, {0x0, r9}}, 0x3f75) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000140)={0x0, 0x2}) 09:33:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748", 0xc7, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:33:36 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:33:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 80) 09:33:36 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x1000010006c) 09:33:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 85) 09:33:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 98) [ 2481.761559] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2481.801573] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2481.816281] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2481.831858] FAULT_INJECTION: forcing a failure. [ 2481.831858] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2481.833664] CPU: 0 PID: 12324 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2481.834693] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2481.835349] FAULT_INJECTION: forcing a failure. [ 2481.835349] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2481.835905] Call Trace: [ 2481.835930] dump_stack+0x107/0x167 [ 2481.835950] should_fail.cold+0x5/0xa [ 2481.835975] __alloc_pages_nodemask+0x182/0x600 [ 2481.835999] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2481.836024] ? find_get_entry+0x2c8/0x740 [ 2481.836040] ? vmacache_find+0x55/0x2a0 [ 2481.836068] alloc_pages_current+0x187/0x280 [ 2481.842498] __page_cache_alloc+0x2d2/0x360 [ 2481.843154] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2481.843934] pagecache_get_page+0x2c7/0xc80 [ 2481.844571] ? asm_exc_page_fault+0x1e/0x30 [ 2481.845220] grab_cache_page_write_begin+0x64/0xa0 [ 2481.845953] ext4_da_write_begin+0x2f3/0xd40 [ 2481.846597] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2481.847390] ? ext4_write_begin+0x10f0/0x10f0 [ 2481.848055] ? copyout_mc+0x140/0x140 [ 2481.848620] generic_perform_write+0x20a/0x4f0 [ 2481.849310] ? page_cache_prev_miss+0x310/0x310 [ 2481.850006] ? down_write_killable+0x180/0x180 [ 2481.850694] ext4_buffered_write_iter+0x232/0x4a0 [ 2481.851412] ext4_file_write_iter+0xc11/0x18d0 [ 2481.852106] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2481.852780] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2481.853557] new_sync_write+0x42c/0x660 [ 2481.854152] ? new_sync_read+0x6f0/0x6f0 [ 2481.854765] ? ksys_write+0x12d/0x260 [ 2481.855335] ? lock_release+0x680/0x680 [ 2481.855926] ? selinux_file_permission+0x92/0x520 [ 2481.856636] ? __fget_files+0x296/0x4c0 [ 2481.857240] vfs_write+0x747/0xa70 [ 2481.857770] ksys_write+0x12d/0x260 [ 2481.858316] ? __ia32_sys_read+0xb0/0xb0 [ 2481.858929] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2481.859697] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2481.860461] do_syscall_64+0x33/0x40 [ 2481.861016] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2481.861765] RIP: 0033:0x7fcf10a65b19 [ 2481.862321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2481.865017] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2481.866133] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2481.867186] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2481.868228] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2481.869276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2481.870320] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2481.871405] CPU: 1 PID: 12325 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2481.872433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2481.873634] Call Trace: [ 2481.874033] dump_stack+0x107/0x167 [ 2481.874569] should_fail.cold+0x5/0xa [ 2481.875149] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2481.875948] generic_perform_write+0x279/0x4f0 [ 2481.876627] ? page_cache_prev_miss+0x310/0x310 [ 2481.877317] ? down_write_killable+0x180/0x180 [ 2481.878003] ext4_buffered_write_iter+0x232/0x4a0 [ 2481.878726] ext4_file_write_iter+0xc11/0x18d0 [ 2481.879419] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2481.880106] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2481.880891] new_sync_write+0x42c/0x660 [ 2481.881482] ? new_sync_read+0x6f0/0x6f0 [ 2481.882088] ? ksys_write+0x12d/0x260 [ 2481.882656] ? lock_release+0x680/0x680 [ 2481.883246] ? selinux_file_permission+0x92/0x520 [ 2481.883958] ? __fget_files+0x296/0x4c0 [ 2481.884552] vfs_write+0x747/0xa70 [ 2481.885082] ksys_write+0x12d/0x260 [ 2481.885620] ? __ia32_sys_read+0xb0/0xb0 [ 2481.886228] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2481.887008] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2481.887771] do_syscall_64+0x33/0x40 [ 2481.888324] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2481.889067] RIP: 0033:0x7f1b43d12b19 [ 2481.889612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2481.892300] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2481.893425] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2481.894456] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2481.895498] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2481.896547] FAULT_INJECTION: forcing a failure. [ 2481.896547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2481.896559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2481.896580] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 [ 2481.900337] CPU: 0 PID: 12322 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2481.901379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2481.902592] Call Trace: [ 2481.903003] dump_stack+0x107/0x167 [ 2481.903552] should_fail.cold+0x5/0xa [ 2481.904125] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2481.904926] generic_perform_write+0x279/0x4f0 [ 2481.905619] ? page_cache_prev_miss+0x310/0x310 [ 2481.906318] ? down_write_killable+0x180/0x180 [ 2481.907011] ext4_buffered_write_iter+0x232/0x4a0 [ 2481.907733] ext4_file_write_iter+0xc11/0x18d0 [ 2481.908431] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2481.909118] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2481.909908] new_sync_write+0x42c/0x660 [ 2481.910508] ? new_sync_read+0x6f0/0x6f0 [ 2481.911122] ? ksys_write+0x12d/0x260 [ 2481.911688] ? lock_release+0x680/0x680 [ 2481.912279] ? selinux_file_permission+0x92/0x520 [ 2481.913001] ? __fget_files+0x296/0x4c0 [ 2481.913605] vfs_write+0x747/0xa70 [ 2481.914144] ksys_write+0x12d/0x260 [ 2481.914696] ? __ia32_sys_read+0xb0/0xb0 [ 2481.915309] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2481.916082] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2481.916848] do_syscall_64+0x33/0x40 [ 2481.917403] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2481.918172] RIP: 0033:0x7f8c54bcdb19 [ 2481.918738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2481.921441] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2481.922565] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2481.923624] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2481.924678] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2481.925733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2481.926790] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:33:36 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100074) 09:33:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 81) 09:33:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xffd) [ 2482.088355] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:33:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 99) 09:33:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748", 0xc7, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:33:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 86) 09:33:36 executing program 3: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000000)={{0x1, 0x1, 0x2b, 0x1}}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000140)=""/4096) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) [ 2482.218042] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2482.236476] FAULT_INJECTION: forcing a failure. [ 2482.236476] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2482.238509] CPU: 1 PID: 12444 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2482.239540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2482.240744] Call Trace: [ 2482.241141] dump_stack+0x107/0x167 [ 2482.241686] should_fail.cold+0x5/0xa [ 2482.242257] __alloc_pages_nodemask+0x182/0x600 [ 2482.242981] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2482.243871] ? find_get_entry+0x2c8/0x740 [ 2482.244479] ? vmacache_find+0x55/0x2a0 [ 2482.245070] alloc_pages_current+0x187/0x280 [ 2482.245725] __page_cache_alloc+0x2d2/0x360 [ 2482.246364] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2482.247147] pagecache_get_page+0x2c7/0xc80 [ 2482.247790] ? asm_exc_page_fault+0x1e/0x30 [ 2482.248421] grab_cache_page_write_begin+0x64/0xa0 [ 2482.249147] ext4_da_write_begin+0x2f3/0xd40 [ 2482.249788] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2482.250547] ? ext4_write_begin+0x10f0/0x10f0 [ 2482.251204] ? copyout_mc+0x140/0x140 [ 2482.251779] generic_perform_write+0x20a/0x4f0 [ 2482.252460] ? page_cache_prev_miss+0x310/0x310 [ 2482.253143] ? down_write_killable+0x180/0x180 [ 2482.253828] ext4_buffered_write_iter+0x232/0x4a0 [ 2482.254539] ext4_file_write_iter+0xc11/0x18d0 [ 2482.255228] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2482.255913] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2482.256687] new_sync_write+0x42c/0x660 [ 2482.257271] ? new_sync_read+0x6f0/0x6f0 [ 2482.257872] ? ksys_write+0x12d/0x260 [ 2482.258438] ? lock_release+0x680/0x680 [ 2482.259037] ? selinux_file_permission+0x92/0x520 [ 2482.259745] ? __fget_files+0x296/0x4c0 [ 2482.260335] vfs_write+0x747/0xa70 [ 2482.260864] ksys_write+0x12d/0x260 [ 2482.261393] ? __ia32_sys_read+0xb0/0xb0 [ 2482.261990] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2482.262766] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2482.263516] do_syscall_64+0x33/0x40 [ 2482.264058] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2482.264798] RIP: 0033:0x7f1b43d12b19 [ 2482.265342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2482.267989] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2482.269092] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2482.270118] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2482.271153] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2482.272183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2482.273215] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 [ 2482.308074] FAULT_INJECTION: forcing a failure. [ 2482.308074] name failslab, interval 1, probability 0, space 0, times 0 [ 2482.310192] CPU: 0 PID: 12489 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2482.311197] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2482.312382] Call Trace: [ 2482.312642] FAULT_INJECTION: forcing a failure. [ 2482.312642] name failslab, interval 1, probability 0, space 0, times 0 [ 2482.312772] dump_stack+0x107/0x167 [ 2482.312795] should_fail.cold+0x5/0xa [ 2482.315454] ? create_object.isra.0+0x3a/0xa20 [ 2482.316112] ? create_object.isra.0+0x3a/0xa20 [ 2482.316772] should_failslab+0x5/0x20 [ 2482.317317] kmem_cache_alloc+0x5b/0x310 [ 2482.317909] create_object.isra.0+0x3a/0xa20 [ 2482.318542] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2482.319293] kmem_cache_alloc+0x159/0x310 [ 2482.319902] alloc_buffer_head+0x20/0x110 [ 2482.320497] alloc_page_buffers+0x14d/0x700 [ 2482.321125] create_empty_buffers+0x2c/0x640 [ 2482.321760] ? start_this_handle+0xfdd/0x1390 [ 2482.322404] ? start_this_handle+0xd57/0x1390 [ 2482.323059] create_page_buffers+0x1bb/0x230 [ 2482.323700] __block_write_begin_int+0x1d1/0x19c0 [ 2482.324401] ? ext4_da_release_space+0x480/0x480 [ 2482.325096] ? kmem_cache_alloc+0x2a6/0x310 [ 2482.325724] ? remove_inode_buffers+0x300/0x300 [ 2482.326393] ? jbd2__journal_start+0xf3/0x7e0 [ 2482.327066] ext4_da_write_begin+0x37d/0xd40 [ 2482.327716] ? ext4_write_begin+0x10f0/0x10f0 [ 2482.328357] ? copyout_mc+0x140/0x140 [ 2482.328923] generic_perform_write+0x20a/0x4f0 [ 2482.329590] ? page_cache_prev_miss+0x310/0x310 [ 2482.330264] ? down_write_killable+0x180/0x180 [ 2482.330946] ext4_buffered_write_iter+0x232/0x4a0 [ 2482.331646] ext4_file_write_iter+0xc11/0x18d0 [ 2482.332323] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2482.332992] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2482.333749] new_sync_write+0x42c/0x660 [ 2482.334324] ? new_sync_read+0x6f0/0x6f0 [ 2482.334915] ? ksys_write+0x12d/0x260 [ 2482.335462] ? lock_release+0x680/0x680 [ 2482.336030] ? selinux_file_permission+0x92/0x520 [ 2482.336721] ? __fget_files+0x296/0x4c0 [ 2482.337298] vfs_write+0x747/0xa70 [ 2482.337813] ksys_write+0x12d/0x260 [ 2482.338335] ? __ia32_sys_read+0xb0/0xb0 [ 2482.338936] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2482.339680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2482.340417] do_syscall_64+0x33/0x40 [ 2482.340950] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2482.341674] RIP: 0033:0x7f8c54bcdb19 [ 2482.342206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2482.344796] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2482.345868] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2482.346883] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2482.347888] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2482.348898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2482.349905] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2482.350960] CPU: 1 PID: 12498 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2482.351987] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2482.353204] Call Trace: [ 2482.353597] dump_stack+0x107/0x167 [ 2482.354138] should_fail.cold+0x5/0xa [ 2482.354707] ? jbd2__journal_start+0x190/0x7e0 [ 2482.355384] should_failslab+0x5/0x20 [ 2482.355946] kmem_cache_alloc+0x5b/0x310 [ 2482.356549] jbd2__journal_start+0x190/0x7e0 [ 2482.357208] __ext4_journal_start_sb+0x214/0x390 [ 2482.357912] ext4_da_write_begin+0x51f/0xd40 [ 2482.358572] ? ext4_write_begin+0x10f0/0x10f0 [ 2482.359251] ? copyout_mc+0x140/0x140 [ 2482.359828] generic_perform_write+0x20a/0x4f0 [ 2482.360518] ? page_cache_prev_miss+0x310/0x310 [ 2482.361208] ? down_write_killable+0x180/0x180 [ 2482.361889] ext4_buffered_write_iter+0x232/0x4a0 [ 2482.362600] ext4_file_write_iter+0xc11/0x18d0 [ 2482.363309] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2482.363986] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2482.364768] new_sync_write+0x42c/0x660 [ 2482.365360] ? new_sync_read+0x6f0/0x6f0 [ 2482.365956] ? ksys_write+0x12d/0x260 [ 2482.366524] ? lock_release+0x680/0x680 [ 2482.367121] ? selinux_file_permission+0x92/0x520 [ 2482.367832] ? __fget_files+0x296/0x4c0 [ 2482.368437] vfs_write+0x747/0xa70 [ 2482.368981] ksys_write+0x12d/0x260 [ 2482.369527] ? __ia32_sys_read+0xb0/0xb0 [ 2482.370129] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2482.370911] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2482.371673] do_syscall_64+0x33/0x40 [ 2482.372233] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2482.372986] RIP: 0033:0x7fcf10a65b19 [ 2482.373534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2482.376204] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2482.377328] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2482.378384] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2482.379435] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2482.380475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2482.381524] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 09:33:36 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:33:36 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0xa) getsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000380), &(0x7f00000003c0)=0x4) sendmsg$nl_generic(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x70, 0x3f, 0x200, 0x70bd2b, 0x25dfdbfe, {0x4}, [@nested={0x50, 0x95, 0x0, 0x1, [@typed={0x39, 0x62, 0x0, 0x0, @binary="558462462068ccdd0cbd53a7bcc48fca45db1dc5ddc35dcb8088a1cb7353ffefb3cf54dcc1cafebfd42f5f71b523e937260aedde92"}, @typed={0x8, 0x5b, 0x0, 0x0, @u32=0xffff0000}, @typed={0x8, 0x37, 0x0, 0x0, @fd}]}, @typed={0xa, 0x19, 0x0, 0x0, @str='.+-)]\x00'}]}, 0x70}, 0x1, 0x0, 0x0, 0x20004001}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x5e, 0x23, 0x100, 0x1000, 0x0, {0x1d}}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedreceive(r3, &(0x7f0000000000)=""/208, 0xd0, 0x9b3f, &(0x7f0000000180)={r4, r5+10000000}) 09:33:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1ffd) [ 2482.462968] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:33:36 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x1000010007a) 09:33:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 82) 09:33:36 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x34, r0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_CHANNELS_HEADER={0x4}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x6f6e}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008105}, 0x2400c401) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) 09:33:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748", 0xc7, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2482.579598] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2482.624382] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2482.641666] FAULT_INJECTION: forcing a failure. [ 2482.641666] name failslab, interval 1, probability 0, space 0, times 0 [ 2482.643582] CPU: 1 PID: 12564 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2482.644579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2482.645762] Call Trace: [ 2482.646148] dump_stack+0x107/0x167 [ 2482.646683] should_fail.cold+0x5/0xa [ 2482.647238] ? jbd2__journal_start+0x190/0x7e0 [ 2482.647902] should_failslab+0x5/0x20 [ 2482.648453] kmem_cache_alloc+0x5b/0x310 [ 2482.649043] jbd2__journal_start+0x190/0x7e0 [ 2482.649691] __ext4_journal_start_sb+0x214/0x390 [ 2482.650382] ext4_da_write_begin+0x51f/0xd40 [ 2482.651042] ? ext4_write_begin+0x10f0/0x10f0 [ 2482.651682] ? copyout_mc+0x140/0x140 [ 2482.652242] generic_perform_write+0x20a/0x4f0 [ 2482.652913] ? page_cache_prev_miss+0x310/0x310 [ 2482.653590] ? down_write_killable+0x180/0x180 [ 2482.654255] ext4_buffered_write_iter+0x232/0x4a0 [ 2482.654960] ext4_file_write_iter+0xc11/0x18d0 [ 2482.655634] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2482.656302] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2482.657068] new_sync_write+0x42c/0x660 [ 2482.657644] ? new_sync_read+0x6f0/0x6f0 [ 2482.658233] ? ksys_write+0x12d/0x260 [ 2482.658794] ? lock_release+0x680/0x680 [ 2482.659367] ? selinux_file_permission+0x92/0x520 [ 2482.660063] ? __fget_files+0x296/0x4c0 [ 2482.660638] vfs_write+0x747/0xa70 [ 2482.661154] ksys_write+0x12d/0x260 [ 2482.661673] ? __ia32_sys_read+0xb0/0xb0 [ 2482.662261] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2482.663016] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2482.663748] do_syscall_64+0x33/0x40 [ 2482.664279] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2482.665007] RIP: 0033:0x7f1b43d12b19 [ 2482.665542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2482.668269] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2482.669335] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2482.670335] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2482.671348] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2482.672350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2482.673350] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:33:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 100) 09:33:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 87) 09:33:50 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2495.780268] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2495.785069] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:33:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 83) 09:33:50 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100300) 09:33:50 executing program 3: r0 = mq_open(&(0x7f0000000000)='.)\x00\x00\x00\x00', 0x0, 0x36, 0x0) mq_timedsend(r0, &(0x7f0000000040)="6e9356815370ec323a2c46ca88970f7e310ab5ed47f867de775068d00b4fcb1e1b0b184d5ff89236b05a84124caa57281b8639a8e0c72615d42c6868694b76cb84b71f5d7af8", 0x46, 0x10000, &(0x7f00000000c0)={0x0, 0x989680}) mq_open(&(0x7f0000000300)='.@[\x00', 0x80, 0x10, &(0x7f0000000340)={0x1, 0x73, 0x9}) mq_timedsend(r0, &(0x7f0000000100)="5d7394d939a3a7f10229ae47f92ceb2fc8c345f7557477a63b85f86f743639264b06db697e7503f0352e9f59d7f4bba59cfa6c8656cddcc7839ae83c48101c1a6ca38ec8792625ec2ab17ac1de70da2181350ba6a6a727761590560783abcf97eb61f3b51363276f142277310a4fe366a433877a2ecec1b740c058e29ba72d32cb499766f3d858a81002c75cbe18ecd02383d5d32d5fb26e52ecdf59f79c2de37a1260906579f9fdd392dbaf", 0xac, 0x3, &(0x7f00000001c0)={0x77359400}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cb80)={0xfffffffffffffffe, [{}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x7f, "9656c75f04ba4d"}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000005cb80)={0xfffffffffffffffe, [{}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000005c0)={r3, r6, "057e68531b3bfe996577e7ae577a7eb226936a1ad5e2a9fe9ea45a1d582b5312aebbb76488b77b56677032a1df7efe8cef9b6b3bf9cac882350cecb872f08285128f7aa962fcd0fecdbdd11a0b8f56a7ef604218f849d2392d68ebcf4df716085972d0c57416fd980e3f8e73eb976980400f955eddcb0a3d00bf496e6095e6feaf2f58ae71f154526b7b8c2abf1899bb53b77e4b7ab07c5dec3c51c5859c180f4544d697b5514db0adf56deb7fb44a72d5f53bc2faba41f4957440d04143a6a5d4c9ee8ec4f9228a1eeaa4cffacbbf20f60047ba2264ceec9a28716da8570fdfe07edb905445856bbef821b9cd3eeb85aaf402737986cca9a6ab2c0eea324f73", "5a29ce8561e00fd56c685717c888b21aeaea0771056e9e9d52f63a0c2ecccdfc8a283e30b0415a25eb6dbe11d3299feac00021ed16726c1a5aeaefd6a9067c3578da1112d986a24293dbed70348da135dfd4ba9c6f337a3b42ab3ca0696f4aaf7825640fa71eb786b167e0deda7ca7ffa2ddc9df4677ed2d6c0f401f2f2546887e5441ad3999971d9477ef72be147b5d556a071f4050f7b2e2c5591b79464bde48be21434b931482e171d56cdd24ff3a4936548e8d4ecceb81a2dd469ceff0cc96c11082967d945eee41c4fecdd0e3257677cbb28f3b3b00980ff955e2711096b4d3bf844b1bfed790cf324b4d2af0c1da132eb0051872d63d6767a053cc71b6cad415c5d86ad5a534e004814020b2b290c78d8d20636d1b0d8ec8432cc574f68766398f98e30fdd186391012f657447e3454a16d9e641a992c3248e016d14e2f06212700e7651fde3195881d9bc1bcc44332395257f28f1e8961d3375b3f6f4511bd25401e71b2992bd29efc7fcd964845bce62ad4c78d5dfdcbbf38c95330b885a592046b6a98f0deb0dcc0ecb918181491dc4e34585508f84f974844e8e25c0523a05ecfd2211bd711b000bda8964d791915b71b47fe3d0d988dec54ff5c4ae6034ed9dccdc3fd6180b5d86ab854faa62cc4d8256c602be8328c3adfc29919668cc1e1d0bc866bfb1a8b5a999f05b11644f1c71886cc35d2de84291910087762c61de5efb865d55f2b2da76490834b085150a5a4daaa5e77787a9550a0e41768aea18ab0b083d15d94ee83a2c0d2f19eb342529c0557d866f7271e2ae40059b29cbb6d5d108fb76d1afa938f66f885c772ebc17b9a35fe81668cbbfd92876f513b885753554945940ade5bc28cee0df588cd8c2a0846d20cdca58bb94f8648cc38c7ea4087164429ded8e1c2c80f40ca9486f92b3d00379fcc1b6d38a00095c935bf64a8687182c7df52e0125836ef97aeeaa39673865bcf912856f558902893ba03879293b304bb0b7625a6d4e98a1773f7a648bfa494e16383b83cc3403a3ec1005e71a735b7aaef5e6d7295a7efb9d870c6f15bdaa2c19cd22fcf478391a33a79bb0850b4d353299c56690cb4abecabbee2d2ae607ff32384fc966169ef6c007ab87efab99e7ab76557a392f85b8423c7953e70ca14d0f2e305a4ac3c103d87080412798e64cb9bbbf9cd26f1b18cad9d0cf47a84663de720275aaad3a5c713c0727ec5ed740ec97a9eb718bb93d83a0d9e9e35062232284daab301f554619e725bbd17e9cd0b2cef9bd30dbdca9d6da6565e5b10427662ceffb310e71561f1957e6e4b1b41dd17e9a72ee57443c80288075727870af49b06ae1f71ad58acccff0915490ca22e6e8d98149b90e5d589e4e84f1fe1a0d06a443f88e78d6f3fa9886310e1a08345ce34706144eb54cc0b0f34b6c6a03e074237934664e1ad136a3740991267a1b4719d8fd865950caab8e194f3069db26bd105f155c5479aaf3b858bb0a69bd1f0b90befb4fb5c001c20e89014ef26a1c0f6e2352a3cac6ee856059851c4ecc52f6c4d7ca4aa6d42552f4e108adebf51335fb4c509d5ae5477aa937cc55a5fe3815b9e84c7dde5dbf717c9754d192464fc896edb3fab20143279b4ce5f220653c710abe07b96038407b3e11e6104e050c4223b0a8fd357705748daf366ee028d6d70f64e66bb96ae885db3110894499ca859d3d749b644d57f5059db5ca07d2b15d2f6d93afd8fa2d17a4919116c1b197ed3ea46e7aad45d1e9d74256f65640b8fa94c16f798284803c6a2b3902119304f513b6d2061daa49a7b7fb7ad3859681d5a2259fb8d54795c0e0dddb42f6e3742ecc882d8788e38b6be407438a61b48cde206acc64f5f6f1e96e1ce3b554b8d45746138b2f5259ac11c8f5a375a96c1811f5464dac22c6647691d06f42c67ae52019c1cc4383c008cdeea56714fb2027acfa62dd1be719b00268d661b25ca5307065834f621bd41ec61d0387ff6b7af1c51d1126e3806b447fa1ef34f1936e756aa26409cb7b6310b0fb7f397ff69bbec802c08217184e41df455cf6dfb4430749d9840e93a615dc258c021d6f618586612f89aeff54a2d0f8ceef81052d2af43537db9db2041f13153c5f630fb3926365e6fcd44a57571cab4f3c2708fb7da6e4ea8ff27eead9a49993500feab62f65829086a4294a5a2a72282d6df24435e03240831dba8e5f1364b172316c0c19ca5d074ed1e795e63b2aba69f941a56eba302118f9453be8f1896f9f2afebd8815b89e4d28dae59e1a5d0513620e798ae13c8b2aac9bc7f4fc08ea9a6195bde2c1fef8164726934e6c96e73ed5d0ef22dd380c0fbf3295920c685b23e1cb707cb1c12f60d204231d972d501f517969878960e96fb5f1aa6ef0a4d9260b82bde6643a426cafafa0a0b60591042d247409d0ba15525dddfc60c8ea1611b19cddec59c1322601edf0658758bce1d4b0b5b04d1d4fe383610198c96c44b3e1a16b699cfff43f94feea449a52262370b215bfd587168ff90ac15ccbaa5b86aa0831d155b648d0fbace9d35e7fcba4da538480b402c004220976a24f300fddf875c5f592109fd333f6b4bb76b8f64288f31da406090175c97f2d67d0126c105f4f825d694ef291917cc9bb245bb4a9a13c92c27e286f705346852e46d25880e6e8a4fb5f83612ae381e35db4dde5c5dd587932108e87269dd0091fb9519d2ac836857b00fea2d873b428867c7a853fd9368444d3f8d4bb8f245ed02e5f23f495fbe682987fa6371bd8b70ee481754869d2fca2067dfb0eaf3270a86ea5aaf81828449cb6cb1cf26e44f6ad6330c178c40d410e5dbe4481891dc10f2ca55c43e13f2aa7766a2e75c703cc45176b5c79a57410e1d43e63fd0a1062faf596d260a2674dd387d74799a61258033c110652655f4b391a2e3a5763a1c1c6f8ea82e8133bd90ae1e48b6e0476ab479a1e1f91e326a0b92bcaeb3d853715c7d0b31759523b85800aed05d6c020d74a131f4f94195acd294253dee4107c556d55b8acc494576bf7450faf149a9ea0b0a06effc6722a1e852d9f067fe571e1f7c2664f1632e972448f18dd580d33b6454974ba976b6ea53fac22169c1daf9d1910ec19af3d97bf99fd7245fd9675c3782d347285020f85c7bf24a952d2e3ccb316cf1cd7de26b5bea0fe9343344380dd3e55e37fc9084b22d4c2dadc2403d70315bf54a3443489f3cf8d1e1686ad3a583c7cc4aebd4ac6b30760d9e3667172bceaf19268fb625a741b16ab12acabb11900879bff8416701e8e9d2aa476a37321ed5222b7ee424ca5fa4d553c445407491fb5cc5799c9ec262730c80fcf050e75b3dfd200324f903cb81f09803c6f7cb019f7d6880b67fb5b07207cffe0817da3f46ea5fa9d4a2c22df8b24da91fa4fb3ed205c861818d720fa0514d11d1040f0e1b04cf83b3720b095cd733975992d57afb8a8d8094f8e794e918ea6d83b9b8757b6841ae6eecc0e8e9eb4a818e76ac275c595bbeccf593dc26ce398431ba30a4a85b4596ea70ae54a204e8dd3b6408191fc94f9305858c54d272531133e623a2edc7facb64e834b20779b4e904c8a537e9afe2dd9c8795deba449ae3be47d69b85f705aaaa3cd5f32ad97f5bb1e80573e5f39fb3af80461f217245b451d531fbeaa7fb328c9b327e9ab8f98e96d50d652afcbe7c53050aa633ecedf5a066433ee7bf9ad96c471639056a68f139c4b26e00f5877754330647b1c1c14909e6a7147eb5778ef593b83334eba23123984b9b4fac00a59e984475119e2887c52c0489e6f0970c2f123b90586741848c857db0f0041301edcf14b7b810af8718b61fe0bc712fb148fcf996654684ec6af85aea6a64a9e75b4170e626d83c4246d55bf7a21892a1258c79f4d72807e37e4cc44794a4c26848c2c388551a033feb4ad02e7e012c7e3a29ce8dd2a803265ca83acaee874eb1a5b8e306d3713b9fd2e669a3f984a3cc4986276d030a1df23ff5daa9d2be57269306b8c83dc006ad888d296265a361822efb7a55f865a599ec5fa9275a12a49bb73eb88eac387b39cc0706595a6520f1b4f2320378155548c955ea0afb32ab6f85d7879c46a390d0186593517727754dacfb74b7a272ec9bf41b86bf8e2ebdc8f6077c9205df330c6855b720bd7b2af4da58e7e94a65626dc839bdffe6ac7a33aaf174beacd96441e563e0bbbe201747fae18a96a84024768ee3b7bf5e14f1e620febd7bae35349cf4352791d4ca0e7e8a1d6f699864814be742043dfd7a7a243e978c2a461439d8f78d4adf5c542875ea53dc105f88b16cd2c0c5dbb90b81c16721bea7a6cd0596d0051db6233025ad9e6691ccf21df2ca168f1db5fd553360c1ed625e2b4c9e4fbc709a730518454197415b6add26ad42019096393ba5466707bb504cd84b76d980100286ef54de0973fbe0cff861218002713ee0094d42bd895ad0fc48130913909fe1700200dd45ac5bdab265b5ff52b81dd9795516eb24cde30a9629f8274e613617615789513a543876075b0f6dc9d165cad21d7be78e09e4ff1bd6285b02d41b78a5bf7175d67ab12a8a1905ca9e06a7d1e1a145976b7af1394c6869993e5d36082674d5a3f779e931e267406668254fc0774de57fad06de828107c0ec4677fbdbfb3e8476a9366a37d48187a8c66e653e4ae37f5616350f0b84310f0fda12e2a1824cd8bccace60b823fe2ba9709f3aff881add1770ef0f5cb8a53e60499f6276cfce9ff658fd3bd2398623200c8c70c82f27d7809e146ac9a084e066889ce1bf143a58238090d63932f4eb71d371badaf10e2e0683b26702c43133f104767c153864bd099c43b0b7d406661539096b49b42e6937704c652418827c5387efe1803f2cc6990a10384902fbdf9203ae0a5d6173fc2518691cb7224fc64939c0e7cf25474e7dac704be877312b712458be1673d86ae10bbe024d612db9e5d30399f9491926833466ffb8dbbf45059d49d3e58645229ea9fee68b47b19a4cdecdec608de278ea49f5feb7dcf66a3eb47035ebb297a8b8119abb28d4bde5c99e3a4f20fc6afac740f7cfa5b3d455759ebdda91ff974ebeedc97bec566922b89da5c6ccd442295ba19e5e78f52d267a479ba3a0743a48b424f07956285db00c1789d7501483405d7ae1e07b2929364d495962cd781fcc298aa25f8ddff00a7251d89f60fe2133dba4fa5433f4e233fe07838422128da82dcb79a61ee32094a5c1a993ee5edc73aaceb1a7c0014f2fbe6528861abbe4633da0b57085115e72a91213a0914cb65205a90459dcaf8361564bab0fd7d87289fc06f75138308a3a3f01b44a2e2874a5b09d6788c4b3272d1cadf0dd035e6ff44b41276195e2d3e69366c361454d1fa66cf2d264edd6472f642e4498ce8"}) r8 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r8, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r9 = fcntl$dupfd(r8, 0x0, r1) sendmsg$nl_generic(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000003b00210c2bbd7000ffdbdf250a0000002c7fa1913ada3a3d1b0c00aac1cf783d285cd5b9967613"], 0x14}}, 0x0) mq_timedsend(r9, &(0x7f0000000440)="478dc00839c299c6a2748fb381c0894fc5068ab1863f923319ac03fbaf0608c7a3b7166f63bca1425e7d0d8582f551ea447a2dd58fedce727e30c66d67559e9a222b04bb22bfb98757fe08da0e166afca2b5fd65bb92503c314ad5ccf876ef01b061582f2e452268a71f3513bd22bfaab13cf32ea36a0c6cdaf6d5f28fb7e6250cd7de1988", 0x85, 0x1, &(0x7f0000000500)={0x77359400}) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000380)="780d9454a3a72a9d84073431d2ca9ce1e1750cf5d6284c7ec6bfaf43b2a906517f332f37001419d9adedf6b46b796289661bce8bbf137002", 0x38, 0x9, &(0x7f0000000400)={r10, r11+10000000}) mq_timedsend(r0, &(0x7f0000000200)="8c527c4951efd6122173df31339d1ab0cbc0ff12094004bda0632c940a5ec1d5daed5004f289decdf0bbac1886e030067a50524ace445994ddde8b4d4c2b24a70ed6b34e3db2c400bd58d4162c18eaef94f5c3e73a48689fe93beca26bed639123ca462d98190f471dd167b397a0350dd1ff0d511d0aca8d3d5413f9b8d6e6006f3e3e6d4c820d98006629f93daf5629621c8e67849cb1d7774e9c84797d4164752f6e50cb2555dba2f710ce7d02", 0xae, 0x10, &(0x7f00000002c0)={0x0, 0x3938700}) 09:33:50 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) [ 2495.812946] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d2390243913", 0xce, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:33:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x2ffd) [ 2495.820334] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59 sclass=netlink_route_socket pid=12692 comm=syz-executor.3 [ 2495.851496] FAULT_INJECTION: forcing a failure. [ 2495.851496] name failslab, interval 1, probability 0, space 0, times 0 [ 2495.853518] CPU: 1 PID: 12682 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2495.853571] FAULT_INJECTION: forcing a failure. [ 2495.853571] name failslab, interval 1, probability 0, space 0, times 0 [ 2495.854530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2495.854538] Call Trace: [ 2495.854560] dump_stack+0x107/0x167 [ 2495.854589] should_fail.cold+0x5/0xa [ 2495.858904] ? jbd2__journal_start+0x190/0x7e0 [ 2495.859577] should_failslab+0x5/0x20 [ 2495.860139] kmem_cache_alloc+0x5b/0x310 [ 2495.860745] jbd2__journal_start+0x190/0x7e0 [ 2495.861401] __ext4_journal_start_sb+0x214/0x390 [ 2495.862108] ext4_da_write_begin+0x51f/0xd40 [ 2495.862783] ? ext4_write_begin+0x10f0/0x10f0 [ 2495.863434] ? copyout_mc+0x140/0x140 [ 2495.864012] generic_perform_write+0x20a/0x4f0 [ 2495.864691] ? page_cache_prev_miss+0x310/0x310 [ 2495.865377] ? down_write_killable+0x180/0x180 [ 2495.866059] ext4_buffered_write_iter+0x232/0x4a0 [ 2495.866782] ext4_file_write_iter+0xc11/0x18d0 [ 2495.867470] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2495.868151] ? new_sync_write+0x132/0x660 [ 2495.868769] new_sync_write+0x42c/0x660 [ 2495.869360] ? new_sync_read+0x6f0/0x6f0 [ 2495.869956] ? ksys_write+0x12d/0x260 [ 2495.870522] ? lock_release+0x680/0x680 [ 2495.871117] ? selinux_file_permission+0x92/0x520 [ 2495.871832] ? __fget_files+0x296/0x4c0 [ 2495.872429] vfs_write+0x747/0xa70 [ 2495.872964] ksys_write+0x12d/0x260 [ 2495.873498] ? __ia32_sys_read+0xb0/0xb0 [ 2495.874105] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2495.874877] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2495.875632] do_syscall_64+0x33/0x40 [ 2495.876180] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2495.876926] RIP: 0033:0x7f8c54bcdb19 [ 2495.877473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2495.880137] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2495.881245] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2495.882280] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2495.883326] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2495.884370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2495.885407] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2495.886484] CPU: 0 PID: 12691 Comm: syz-executor.5 Not tainted 5.10.215 #1 [ 2495.887533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2495.888730] Call Trace: [ 2495.889127] dump_stack+0x107/0x167 [ 2495.889662] should_fail.cold+0x5/0xa [ 2495.890226] ? jbd2__journal_start+0x190/0x7e0 [ 2495.890912] should_failslab+0x5/0x20 [ 2495.891490] kmem_cache_alloc+0x5b/0x310 [ 2495.892101] jbd2__journal_start+0x190/0x7e0 [ 2495.892913] __ext4_journal_start_sb+0x214/0x390 [ 2495.893625] ext4_da_write_begin+0x51f/0xd40 [ 2495.894282] ? ext4_write_begin+0x10f0/0x10f0 [ 2495.894946] ? copyout_mc+0x140/0x140 [ 2495.895513] generic_perform_write+0x20a/0x4f0 [ 2495.896190] ? page_cache_prev_miss+0x310/0x310 [ 2495.896867] ? down_write_killable+0x180/0x180 [ 2495.897545] ext4_buffered_write_iter+0x232/0x4a0 [ 2495.898246] ext4_file_write_iter+0xc11/0x18d0 [ 2495.898930] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2495.899619] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2495.900399] new_sync_write+0x42c/0x660 [ 2495.900991] ? new_sync_read+0x6f0/0x6f0 [ 2495.901592] ? ksys_write+0x12d/0x260 [ 2495.902167] ? lock_release+0x680/0x680 [ 2495.902761] ? selinux_file_permission+0x92/0x520 [ 2495.903504] ? __fget_files+0x296/0x4c0 [ 2495.904105] vfs_write+0x747/0xa70 [ 2495.904648] ksys_write+0x12d/0x260 [ 2495.905192] ? __ia32_sys_read+0xb0/0xb0 [ 2495.905795] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2495.906553] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2495.907315] do_syscall_64+0x33/0x40 [ 2495.907861] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2495.908619] RIP: 0033:0x7fcf10a65b19 [ 2495.909167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2495.911857] RSP: 002b:00007fcf0dfdb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2495.912980] RAX: ffffffffffffffda RBX: 00007fcf10b78f60 RCX: 00007fcf10a65b19 [ 2495.914036] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2495.915081] RBP: 00007fcf0dfdb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2495.916119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2495.917165] R13: 00007ffc8daf22ef R14: 00007fcf0dfdb300 R15: 0000000000022000 [ 2495.936374] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59 sclass=netlink_route_socket pid=12692 comm=syz-executor.3 [ 2495.953429] FAULT_INJECTION: forcing a failure. [ 2495.953429] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2495.955489] CPU: 0 PID: 12694 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2495.956503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2495.957713] Call Trace: [ 2495.958109] dump_stack+0x107/0x167 [ 2495.958645] should_fail.cold+0x5/0xa [ 2495.959239] __alloc_pages_nodemask+0x182/0x600 [ 2495.959928] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2495.960823] ? find_get_entry+0x2c8/0x740 [ 2495.961444] ? vmacache_find+0x55/0x2a0 [ 2495.962034] alloc_pages_current+0x187/0x280 [ 2495.962687] __page_cache_alloc+0x2d2/0x360 [ 2495.963350] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2495.964132] pagecache_get_page+0x2c7/0xc80 [ 2495.964774] ? asm_exc_page_fault+0x1e/0x30 [ 2495.965414] grab_cache_page_write_begin+0x64/0xa0 [ 2495.966138] ext4_da_write_begin+0x2f3/0xd40 [ 2495.966790] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2495.967560] ? ext4_write_begin+0x10f0/0x10f0 [ 2495.968224] ? copyout_mc+0x140/0x140 [ 2495.968801] generic_perform_write+0x20a/0x4f0 [ 2495.969493] ? page_cache_prev_miss+0x310/0x310 [ 2495.970193] ? down_write_killable+0x180/0x180 [ 2495.970878] ext4_buffered_write_iter+0x232/0x4a0 [ 2495.971597] ext4_file_write_iter+0xc11/0x18d0 [ 2495.972278] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2495.972952] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2495.973735] new_sync_write+0x42c/0x660 [ 2495.974330] ? new_sync_read+0x6f0/0x6f0 [ 2495.974957] ? ksys_write+0x12d/0x260 [ 2495.975517] ? lock_release+0x680/0x680 [ 2495.976105] ? selinux_file_permission+0x92/0x520 [ 2495.976812] ? __fget_files+0x296/0x4c0 [ 2495.977414] vfs_write+0x747/0xa70 [ 2495.977945] ksys_write+0x12d/0x260 [ 2495.978490] ? __ia32_sys_read+0xb0/0xb0 [ 2495.979100] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2495.979861] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2495.980617] do_syscall_64+0x33/0x40 [ 2495.981164] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2495.981909] RIP: 0033:0x7f1b43d12b19 [ 2495.982464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2495.985139] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2495.986252] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2495.987316] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2495.988345] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2495.989392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2495.990421] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:33:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 88) [ 2496.123410] FAULT_INJECTION: forcing a failure. [ 2496.123410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2496.125254] CPU: 1 PID: 12803 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2496.126259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2496.127467] Call Trace: [ 2496.127860] dump_stack+0x107/0x167 [ 2496.128404] should_fail.cold+0x5/0xa [ 2496.128971] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2496.129759] generic_perform_write+0x279/0x4f0 [ 2496.130438] ? page_cache_prev_miss+0x310/0x310 [ 2496.131125] ? down_write_killable+0x180/0x180 [ 2496.131804] ext4_buffered_write_iter+0x232/0x4a0 [ 2496.132510] ext4_file_write_iter+0xc11/0x18d0 [ 2496.133190] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2496.133865] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2496.134641] new_sync_write+0x42c/0x660 [ 2496.135232] ? new_sync_read+0x6f0/0x6f0 [ 2496.135828] ? ksys_write+0x12d/0x260 [ 2496.136389] ? lock_release+0x680/0x680 [ 2496.136968] ? selinux_file_permission+0x92/0x520 [ 2496.137673] ? __fget_files+0x296/0x4c0 [ 2496.138264] vfs_write+0x747/0xa70 [ 2496.138807] ksys_write+0x12d/0x260 [ 2496.139349] ? __ia32_sys_read+0xb0/0xb0 [ 2496.139943] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2496.140700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2496.141453] do_syscall_64+0x33/0x40 [ 2496.141995] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2496.142902] RIP: 0033:0x7f8c54bcdb19 [ 2496.143440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2496.146063] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2496.147163] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2496.148182] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2496.149201] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2496.150226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2496.151252] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:34:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 89) 09:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x3ffd) 09:34:05 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:34:05 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100500) 09:34:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 84) 09:34:05 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d2390243913", 0xce, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:34:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:34:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40c4}, 0x8000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)={0x1c, r4, 0x609, 0x0, 0x0, {0x27}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x1c}}, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r7) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r9, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)={0x1c, r8, 0x609, 0x0, 0x0, {0x27}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x5c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x44000}, 0x40000) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) [ 2510.908409] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2510.934282] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2510.944251] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2510.959605] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=12825 comm=syz-executor.3 [ 2510.972250] FAULT_INJECTION: forcing a failure. [ 2510.972250] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2510.974456] CPU: 1 PID: 12814 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2510.975523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2510.976922] Call Trace: [ 2510.977335] dump_stack+0x107/0x167 [ 2510.977893] should_fail.cold+0x5/0xa [ 2510.978481] __alloc_pages_nodemask+0x182/0x600 [ 2510.979213] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2510.980134] ? find_get_entry+0x2c8/0x740 [ 2510.980777] ? vmacache_find+0x55/0x2a0 [ 2510.981393] alloc_pages_current+0x187/0x280 [ 2510.981971] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=12825 comm=syz-executor.3 [ 2510.982066] __page_cache_alloc+0x2d2/0x360 [ 2510.984436] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2510.985246] pagecache_get_page+0x2c7/0xc80 [ 2510.985905] ? asm_exc_page_fault+0x1e/0x30 [ 2510.986564] grab_cache_page_write_begin+0x64/0xa0 [ 2510.987323] ext4_da_write_begin+0x2f3/0xd40 [ 2510.988000] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2510.988799] ? ext4_write_begin+0x10f0/0x10f0 [ 2510.989479] ? copyout_mc+0x140/0x140 [ 2510.990071] generic_perform_write+0x20a/0x4f0 [ 2510.990774] ? page_cache_prev_miss+0x310/0x310 [ 2510.991499] ? down_write_killable+0x180/0x180 [ 2510.992219] ext4_buffered_write_iter+0x232/0x4a0 [ 2510.992965] ext4_file_write_iter+0xc11/0x18d0 [ 2510.993678] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2510.994386] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2510.995209] new_sync_write+0x42c/0x660 [ 2510.995819] ? new_sync_read+0x6f0/0x6f0 [ 2510.996455] ? ksys_write+0x12d/0x260 [ 2510.997049] ? lock_release+0x680/0x680 [ 2510.997666] ? selinux_file_permission+0x92/0x520 [ 2510.998423] ? __fget_files+0x296/0x4c0 [ 2510.999060] vfs_write+0x747/0xa70 [ 2510.999623] ksys_write+0x12d/0x260 [ 2511.000194] ? __ia32_sys_read+0xb0/0xb0 [ 2511.000834] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2511.001656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2511.002445] do_syscall_64+0x33/0x40 [ 2511.003040] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2511.003836] RIP: 0033:0x7f8c54bcdb19 [ 2511.004418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2511.007208] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2511.008368] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2511.009463] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2511.010548] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2511.011632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2511.012719] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2511.059228] FAULT_INJECTION: forcing a failure. [ 2511.059228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2511.061625] CPU: 0 PID: 12824 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2511.062641] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2511.063851] Call Trace: [ 2511.064262] dump_stack+0x107/0x167 [ 2511.064810] should_fail.cold+0x5/0xa [ 2511.065382] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2511.066184] generic_perform_write+0x279/0x4f0 [ 2511.066872] ? page_cache_prev_miss+0x310/0x310 [ 2511.067570] ? down_write_killable+0x180/0x180 [ 2511.068260] ext4_buffered_write_iter+0x232/0x4a0 [ 2511.068979] ext4_file_write_iter+0xc11/0x18d0 [ 2511.069675] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2511.070364] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2511.071348] new_sync_write+0x42c/0x660 [ 2511.071966] ? new_sync_read+0x6f0/0x6f0 [ 2511.072738] ? ksys_write+0x12d/0x260 [ 2511.073372] ? lock_release+0x680/0x680 [ 2511.074110] ? selinux_file_permission+0x92/0x520 [ 2511.074904] ? __fget_files+0x296/0x4c0 [ 2511.075659] vfs_write+0x747/0xa70 [ 2511.076239] ksys_write+0x12d/0x260 [ 2511.076926] ? __ia32_sys_read+0xb0/0xb0 [ 2511.077557] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2511.078552] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2511.079393] do_syscall_64+0x33/0x40 [ 2511.080107] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2511.080959] RIP: 0033:0x7f1b43d12b19 [ 2511.081682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2511.084408] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2511.085829] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2511.086901] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2511.088139] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2511.089274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2511.090333] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:34:05 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='./file0\x00']) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x4}, 0x6) lsetxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@md5={0x1, "bedebf1ed1da139ef8ee28538cb9ec49"}, 0x11, 0x6) r1 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r1, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:34:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xffd) 09:34:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x4ffd) 09:34:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 90) 09:34:05 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100600) 09:34:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1ffd) 09:34:05 executing program 3: mq_open(&(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\xe1\xc7\v\x1cG0\x8dF\x8616\x82\xc2\xe2\xaey\xc3\x9a\xf5\x88\xf6\xa7Vf\xdc\xb1\xe0\xeeG\xf3`\xe8\xf4\xac\xdb\x02yC\"\x9b:\xf8\x93\xd1$\x90]s\"\xce\x14\xee\xf6\xf4Ii\xec}\x11\xbb\xd9\x15\xe1\xbf\x06\xfd;~q\xc4)\x9aMa}\xd6=\x1aD\xa9\x05\x19P\x80E!!7\xbe\x90\xab\x93\x95W\xf4k\xbe4\xbesEy=\x15\x9b\x13\xba\x93\xce\xaex\xbc\xd7:\x16\xc7\x9dg\x9dW1@\xa2&\xc1G\x1c\x99D\xbfG{\xcaH\x06`FeW\x99Dx\xd6\xa6~\xa5sqX\r\x01\xa5\xa2\xcc\x0f\xcay\xa9a\xbb9\x93h\x9c\xd1\xddZn\xb2\xb6J4\x10\xf6=\xad\b\xf7\xb2\xea3s\x82\xc9\x06\x02\x12\\nK\xabO`,f', 0x0, 0x0, 0x0) [ 2511.267184] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:34:05 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2511.355212] FAULT_INJECTION: forcing a failure. [ 2511.355212] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2511.357242] CPU: 1 PID: 12940 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2511.358298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2511.359571] Call Trace: [ 2511.359994] dump_stack+0x107/0x167 [ 2511.360568] should_fail.cold+0x5/0xa [ 2511.361166] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2511.361990] generic_perform_write+0x279/0x4f0 [ 2511.362707] ? page_cache_prev_miss+0x310/0x310 [ 2511.363444] ? down_write_killable+0x180/0x180 [ 2511.364163] ext4_buffered_write_iter+0x232/0x4a0 [ 2511.364909] ext4_file_write_iter+0xc11/0x18d0 [ 2511.365613] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2511.366334] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2511.367169] new_sync_write+0x42c/0x660 [ 2511.367793] ? new_sync_read+0x6f0/0x6f0 [ 2511.368427] ? ksys_write+0x12d/0x260 [ 2511.369022] ? lock_release+0x680/0x680 [ 2511.369640] ? selinux_file_permission+0x92/0x520 [ 2511.370386] ? __fget_files+0x296/0x4c0 [ 2511.371030] vfs_write+0x747/0xa70 [ 2511.371593] ksys_write+0x12d/0x260 [ 2511.372169] ? __ia32_sys_read+0xb0/0xb0 [ 2511.372803] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2511.373604] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2511.374403] do_syscall_64+0x33/0x40 [ 2511.374988] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2511.375773] RIP: 0033:0x7f8c54bcdb19 [ 2511.376355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2511.379153] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2511.380313] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2511.381393] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2511.382470] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2511.383561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2511.384639] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2511.456296] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:34:17 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:34:17 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x105000, 0x30) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x88) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)={0x3}) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f0000000540)=[{{&(0x7f00000000c0)=@abs, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/36, 0x24}, {&(0x7f0000000180)=""/23, 0x17}, {&(0x7f00000001c0)=""/204, 0xcc}], 0x3, &(0x7f0000000300)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8}}, {{&(0x7f00000003c0), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)=""/28, 0x1c}], 0x1, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}], 0x2, 0x3, &(0x7f0000000600)={r2, r3+10000000}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r7 = fcntl$dupfd(r6, 0x0, r5) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000640)={0x9}) write$binfmt_aout(r7, &(0x7f0000000680)={{0x1c4, 0xf8, 0x1, 0x3c9, 0x344, 0x9, 0x55, 0xfffffff9}, "db0d8278c7d931b1052ee7efa21a231aa7c971de047b12c24afaa2980a3612e8d5050460f4693f7ea9639c2e34637456f01fc2f4cbe4eb27f43742953fbf1855b9", ['\x00', '\x00', '\x00', '\x00']}, 0x461) 09:34:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 91) 09:34:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x5ffd) 09:34:17 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100700) 09:34:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 85) 09:34:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x2ffd) 09:34:17 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d2390243913", 0xce, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2523.723436] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2523.728046] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2523.757512] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2523.759433] FAULT_INJECTION: forcing a failure. [ 2523.759433] name failslab, interval 1, probability 0, space 0, times 0 [ 2523.760935] CPU: 0 PID: 13071 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2523.761559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2523.762257] Call Trace: [ 2523.762507] dump_stack+0x107/0x167 [ 2523.762840] should_fail.cold+0x5/0xa [ 2523.763203] ? create_object.isra.0+0x3a/0xa20 [ 2523.763622] should_failslab+0x5/0x20 [ 2523.763968] kmem_cache_alloc+0x5b/0x310 [ 2523.764320] ? lru_cache_add+0x45c/0x800 [ 2523.764694] create_object.isra.0+0x3a/0xa20 [ 2523.765095] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2523.765511] kmem_cache_alloc+0x159/0x310 [ 2523.765898] jbd2__journal_start+0x190/0x7e0 [ 2523.766280] __ext4_journal_start_sb+0x214/0x390 [ 2523.766716] ext4_da_write_begin+0x51f/0xd40 [ 2523.767136] ? ext4_write_begin+0x10f0/0x10f0 [ 2523.767540] ? copyout_mc+0x140/0x140 [ 2523.767893] generic_perform_write+0x20a/0x4f0 [ 2523.768320] ? page_cache_prev_miss+0x310/0x310 [ 2523.768745] ? down_write_killable+0x180/0x180 [ 2523.769173] ext4_buffered_write_iter+0x232/0x4a0 [ 2523.769606] ext4_file_write_iter+0xc11/0x18d0 [ 2523.770002] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2523.770422] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2523.770898] new_sync_write+0x42c/0x660 [ 2523.771257] ? new_sync_read+0x6f0/0x6f0 [ 2523.771593] ? ksys_write+0x12d/0x260 [ 2523.771934] ? lock_release+0x680/0x680 [ 2523.772281] ? selinux_file_permission+0x92/0x520 [ 2523.772682] ? __fget_files+0x296/0x4c0 [ 2523.773035] vfs_write+0x747/0xa70 [ 2523.773349] ksys_write+0x12d/0x260 [ 2523.773651] ? __ia32_sys_read+0xb0/0xb0 [ 2523.774009] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2523.774450] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2523.774914] do_syscall_64+0x33/0x40 [ 2523.775238] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2523.775689] RIP: 0033:0x7f1b43d12b19 [ 2523.776036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2523.777615] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2523.778269] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2523.778841] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2523.779460] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2523.780075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2523.780698] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:34:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 86) [ 2523.829302] FAULT_INJECTION: forcing a failure. [ 2523.829302] name failslab, interval 1, probability 0, space 0, times 0 [ 2523.831451] CPU: 1 PID: 13069 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2523.832421] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2523.833560] Call Trace: [ 2523.833938] dump_stack+0x107/0x167 [ 2523.834448] should_fail.cold+0x5/0xa [ 2523.834988] ? jbd2__journal_start+0x190/0x7e0 [ 2523.835638] should_failslab+0x5/0x20 [ 2523.836183] kmem_cache_alloc+0x5b/0x310 [ 2523.836759] jbd2__journal_start+0x190/0x7e0 [ 2523.837386] __ext4_journal_start_sb+0x214/0x390 [ 2523.838050] ext4_da_write_begin+0x51f/0xd40 [ 2523.838689] ? ext4_write_begin+0x10f0/0x10f0 [ 2523.839323] ? copyout_mc+0x140/0x140 [ 2523.839869] generic_perform_write+0x20a/0x4f0 [ 2523.840544] ? page_cache_prev_miss+0x310/0x310 [ 2523.841197] ? down_write_killable+0x180/0x180 [ 2523.841847] ext4_buffered_write_iter+0x232/0x4a0 [ 2523.842528] ext4_file_write_iter+0xc11/0x18d0 [ 2523.843193] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2523.843842] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2523.844578] new_sync_write+0x42c/0x660 [ 2523.845137] ? new_sync_read+0x6f0/0x6f0 [ 2523.845707] ? ksys_write+0x12d/0x260 [ 2523.846253] ? lock_release+0x680/0x680 [ 2523.846838] ? selinux_file_permission+0x92/0x520 [ 2523.847524] ? __fget_files+0x296/0x4c0 [ 2523.848094] vfs_write+0x747/0xa70 [ 2523.848597] ksys_write+0x12d/0x260 [ 2523.849108] ? __ia32_sys_read+0xb0/0xb0 [ 2523.849675] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2523.850400] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2523.851129] do_syscall_64+0x33/0x40 [ 2523.851672] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2523.852393] RIP: 0033:0x7f8c54bcdb19 [ 2523.852921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2523.855440] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2523.856494] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2523.857489] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2523.858483] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2523.859480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2523.860466] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:34:18 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2523.918349] FAULT_INJECTION: forcing a failure. [ 2523.918349] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2523.919632] CPU: 0 PID: 13138 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2523.920203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2523.920880] Call Trace: [ 2523.921112] dump_stack+0x107/0x167 [ 2523.921414] should_fail.cold+0x5/0xa [ 2523.921735] __alloc_pages_nodemask+0x182/0x600 [ 2523.922121] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2523.922618] ? find_get_entry+0x2c8/0x740 [ 2523.922957] ? vmacache_find+0x55/0x2a0 [ 2523.923303] alloc_pages_current+0x187/0x280 [ 2523.923664] __page_cache_alloc+0x2d2/0x360 [ 2523.924022] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2523.924462] pagecache_get_page+0x2c7/0xc80 [ 2523.924819] ? asm_exc_page_fault+0x1e/0x30 [ 2523.925184] grab_cache_page_write_begin+0x64/0xa0 [ 2523.925593] ext4_da_write_begin+0x2f3/0xd40 [ 2523.925956] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2523.926386] ? ext4_write_begin+0x10f0/0x10f0 [ 2523.926754] ? copyout_mc+0x140/0x140 [ 2523.927076] generic_perform_write+0x20a/0x4f0 [ 2523.927462] ? page_cache_prev_miss+0x310/0x310 [ 2523.927850] ? down_write_killable+0x180/0x180 [ 2523.928232] ext4_buffered_write_iter+0x232/0x4a0 [ 2523.928630] ext4_file_write_iter+0xc11/0x18d0 [ 2523.929014] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2523.929393] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2523.929829] new_sync_write+0x42c/0x660 [ 2523.930163] ? new_sync_read+0x6f0/0x6f0 [ 2523.930505] ? ksys_write+0x12d/0x260 [ 2523.930823] ? lock_release+0x680/0x680 [ 2523.931170] ? selinux_file_permission+0x92/0x520 [ 2523.931575] ? __fget_files+0x296/0x4c0 [ 2523.931934] vfs_write+0x747/0xa70 [ 2523.932232] ksys_write+0x12d/0x260 [ 2523.932535] ? __ia32_sys_read+0xb0/0xb0 [ 2523.932880] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2523.933309] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2523.933732] do_syscall_64+0x33/0x40 [ 2523.934052] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2523.934476] RIP: 0033:0x7f1b43d12b19 [ 2523.934784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2523.936337] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2523.936959] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2523.937549] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2523.938134] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2523.938720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2523.939313] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:34:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x3ffd) 09:34:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x6ffd) 09:34:18 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000104800) 09:34:18 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mq_getsetattr(r2, &(0x7f0000000000)={0x3, 0x100000000, 0xffffffffffffffff, 0x401}, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() tkill(r4, 0x7) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r6, 0x0, r5) pwritev(r6, &(0x7f0000000440)=[{&(0x7f0000000180)="9677e2fc592580", 0x7}, {&(0x7f00000002c0)="db44ce86f23dcb5de76f2c90a73d70d9be1b22628e7babc7bc41a40e58683ec0b3b673da79294f21e646bdb518c163496fb8e3e68c79f312d4ce938dba4fb787fca210ceb9004d2b97c735849837bad8336abbd2aef7cde9967d75c22efbda7113390a1b720f3fa16289a7092feea6aabeec1132cdddb241daf0ae2fded344", 0x7f}, {&(0x7f0000000340)="16e9098c2a7244844018e02c4e8a3e9e27b19c9f2372c7d520ff0b8913055f39f0fac25550603013227060336630150734b2f7f92001bc7cc9fe749005b1118e5e4791edd07c9791b9363b0a400f44578c5440dab5d7d24e30ef9211d321021a58255c9c0f7854a584c530b82b94fcee6da21bc933a38d4bfebaeb1ff819d953796912c007a7dfc5aac00b0b3f3760eb3f9daab87532e165ac4ce6c82bf8c2ba374380b4228a25a945a826d670bf2aed924a0bb7c8625e211e4a101298b2972ca27f6c47486da711c3ca017aba81ff722925eab0db39d3fbb75b", 0xda}], 0x3, 0x80000001, 0x5) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, r4, 0x7, 0xffffffffffffffff, 0x1) kcmp$KCMP_EPOLL_TFD(r4, 0x0, 0x7, r3, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x7, 0x1c, 0x4, 0x4, 0x0, 0x4, 0x60284, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000080), 0x6}, 0x840, 0x5, 0x6, 0x9, 0x81, 0xfff, 0xff53, 0x0, 0x8000, 0x0, 0x8}, r4, 0x9, r2, 0xa) [ 2523.972097] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:34:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x4ffd) [ 2524.021703] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:34:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 92) 09:34:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 87) 09:34:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0x31b) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={[0x8001]}, 0x8, 0x100000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r2, &(0x7f0000000400)="aadbda1f90abc609", 0x8, 0x0, &(0x7f0000001400)={0x2, 0x0, @remote}, 0x10) r3 = dup(r2) close(r3) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', r1, &(0x7f0000000140)='./file1\x00', 0x2) mq_open(&(0x7f0000000100)='.)-(]\x00', 0x800, 0x0, 0x0) 09:34:18 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfa", 0xd1, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2524.123136] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:34:18 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2524.168627] FAULT_INJECTION: forcing a failure. [ 2524.168627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2524.169739] CPU: 0 PID: 13255 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2524.170301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2524.170924] Call Trace: [ 2524.171151] dump_stack+0x107/0x167 [ 2524.171463] should_fail.cold+0x5/0xa [ 2524.171769] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2524.172212] generic_perform_write+0x279/0x4f0 [ 2524.172598] ? page_cache_prev_miss+0x310/0x310 [ 2524.172973] ? down_write_killable+0x180/0x180 [ 2524.173351] ext4_buffered_write_iter+0x232/0x4a0 [ 2524.173745] ext4_file_write_iter+0xc11/0x18d0 [ 2524.174124] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2524.174496] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2524.174901] new_sync_write+0x42c/0x660 [ 2524.175232] ? new_sync_read+0x6f0/0x6f0 [ 2524.175565] ? ksys_write+0x12d/0x260 [ 2524.175854] ? lock_release+0x680/0x680 [ 2524.176191] vfs_write+0x747/0xa70 [ 2524.176485] ksys_write+0x12d/0x260 [ 2524.176781] ? __ia32_sys_read+0xb0/0xb0 [ 2524.177115] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2524.177544] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2524.177965] do_syscall_64+0x33/0x40 [ 2524.178266] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2524.178654] RIP: 0033:0x7f8c54bcdb19 [ 2524.178961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2524.180320] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2524.180896] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2524.181419] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2524.181956] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2524.182489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2524.182692] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2524.183032] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2524.189305] FAULT_INJECTION: forcing a failure. [ 2524.189305] name failslab, interval 1, probability 0, space 0, times 0 [ 2524.190263] CPU: 0 PID: 13266 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2524.190774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2524.191390] Call Trace: [ 2524.191588] dump_stack+0x107/0x167 [ 2524.191861] should_fail.cold+0x5/0xa [ 2524.192159] ? jbd2__journal_start+0x190/0x7e0 [ 2524.192499] should_failslab+0x5/0x20 [ 2524.192786] kmem_cache_alloc+0x5b/0x310 [ 2524.193132] jbd2__journal_start+0x190/0x7e0 [ 2524.193476] __ext4_journal_start_sb+0x214/0x390 [ 2524.193864] ext4_da_write_begin+0x51f/0xd40 [ 2524.194201] ? ext4_write_begin+0x10f0/0x10f0 [ 2524.194560] ? copyout_mc+0x140/0x140 [ 2524.194855] generic_perform_write+0x20a/0x4f0 [ 2524.195243] ? page_cache_prev_miss+0x310/0x310 [ 2524.195593] ? down_write_killable+0x180/0x180 [ 2524.195981] ext4_buffered_write_iter+0x232/0x4a0 [ 2524.196347] ext4_file_write_iter+0xc11/0x18d0 [ 2524.196729] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2524.197071] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2524.197497] new_sync_write+0x42c/0x660 [ 2524.197798] ? new_sync_read+0x6f0/0x6f0 [ 2524.198099] ? ksys_write+0x12d/0x260 [ 2524.198414] ? lock_release+0x680/0x680 [ 2524.198723] ? selinux_file_permission+0x92/0x520 [ 2524.199129] ? __fget_files+0x296/0x4c0 [ 2524.199438] vfs_write+0x747/0xa70 [ 2524.199742] ksys_write+0x12d/0x260 [ 2524.200021] ? __ia32_sys_read+0xb0/0xb0 [ 2524.200353] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2524.200782] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2524.201167] do_syscall_64+0x33/0x40 [ 2524.201471] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2524.201850] RIP: 0033:0x7f1b43d12b19 [ 2524.202151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2524.203492] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2524.204113] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2524.204637] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2524.205159] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2524.205678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2524.206198] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:34:30 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfa", 0xd1, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:34:30 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() tkill(r1, 0x7) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, r1, 0x7, 0xffffffffffffffff, 0x1) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() tkill(r3, 0x7) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, r3, 0x7, 0xffffffffffffffff, 0x1) kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r2, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x30) clone3(&(0x7f00000003c0)={0xa000000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), {0x23}, &(0x7f0000000180)=""/176, 0xb0, &(0x7f0000000240)=""/247, &(0x7f0000000340)=[0xffffffffffffffff, r1, r3], 0x3, {r4}}, 0x58) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0xffffffffffffffff, 0x10, &(0x7f0000000000)={0xfff}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000440)={{0x1, 0x1, 0x18, r4, {0x5, 0x7}}, './file0\x00'}) write$P9_RRENAME(r5, &(0x7f0000000480)={0x7, 0x15, 0x1}, 0x7) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x800, 0x0, 0x0) sched_setparam(0xffffffffffffffff, &(0x7f0000000040)=0x28) 09:34:30 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:34:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x7ffd) 09:34:30 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000104c00) 09:34:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 93) 09:34:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 88) 09:34:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x5ffd) [ 2536.734617] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2536.751185] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2536.759230] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2536.815012] FAULT_INJECTION: forcing a failure. [ 2536.815012] name failslab, interval 1, probability 0, space 0, times 0 [ 2536.816980] CPU: 1 PID: 13337 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2536.818006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2536.819236] Call Trace: [ 2536.819647] dump_stack+0x107/0x167 [ 2536.820192] should_fail.cold+0x5/0xa [ 2536.820760] ? jbd2__journal_start+0x190/0x7e0 [ 2536.821439] should_failslab+0x5/0x20 [ 2536.822004] kmem_cache_alloc+0x5b/0x310 [ 2536.822607] jbd2__journal_start+0x190/0x7e0 [ 2536.823271] __ext4_journal_start_sb+0x214/0x390 [ 2536.823960] ext4_da_write_begin+0x51f/0xd40 [ 2536.824623] ? ext4_write_begin+0x10f0/0x10f0 [ 2536.825275] ? copyout_mc+0x140/0x140 [ 2536.825862] generic_perform_write+0x20a/0x4f0 [ 2536.826548] ? page_cache_prev_miss+0x310/0x310 [ 2536.827258] ? down_write_killable+0x180/0x180 [ 2536.827943] ext4_buffered_write_iter+0x232/0x4a0 [ 2536.828663] ext4_file_write_iter+0xc11/0x18d0 [ 2536.829356] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2536.830037] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2536.830788] new_sync_write+0x42c/0x660 [ 2536.831399] ? new_sync_read+0x6f0/0x6f0 [ 2536.831990] ? ksys_write+0x12d/0x260 [ 2536.832562] ? lock_release+0x680/0x680 [ 2536.833140] ? selinux_file_permission+0x92/0x520 [ 2536.833868] ? __fget_files+0x296/0x4c0 [ 2536.834442] vfs_write+0x747/0xa70 [ 2536.834981] ksys_write+0x12d/0x260 [ 2536.835511] ? __ia32_sys_read+0xb0/0xb0 [ 2536.836123] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2536.836866] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2536.837636] do_syscall_64+0x33/0x40 [ 2536.838181] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2536.838947] RIP: 0033:0x7f8c54bcdb19 [ 2536.839491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2536.842194] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2536.843278] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2536.844327] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2536.844446] FAULT_INJECTION: forcing a failure. [ 2536.844446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2536.845363] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2536.845375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2536.845387] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2536.851091] CPU: 0 PID: 13342 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2536.852139] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2536.853348] Call Trace: [ 2536.853747] dump_stack+0x107/0x167 [ 2536.854301] should_fail.cold+0x5/0xa [ 2536.854880] __alloc_pages_nodemask+0x182/0x600 [ 2536.855592] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2536.856480] ? find_get_entry+0x2c8/0x740 [ 2536.857097] ? vmacache_find+0x55/0x2a0 [ 2536.857710] alloc_pages_current+0x187/0x280 [ 2536.858371] __page_cache_alloc+0x2d2/0x360 [ 2536.859020] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2536.859830] pagecache_get_page+0x2c7/0xc80 [ 2536.860474] ? asm_exc_page_fault+0x1e/0x30 [ 2536.861127] grab_cache_page_write_begin+0x64/0xa0 [ 2536.861863] ext4_da_write_begin+0x2f3/0xd40 [ 2536.862514] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2536.863309] ? ext4_write_begin+0x10f0/0x10f0 [ 2536.863989] ? copyout_mc+0x140/0x140 [ 2536.864583] generic_perform_write+0x20a/0x4f0 [ 2536.865276] ? page_cache_prev_miss+0x310/0x310 [ 2536.865980] ? down_write_killable+0x180/0x180 [ 2536.866668] ext4_buffered_write_iter+0x232/0x4a0 [ 2536.867396] ext4_file_write_iter+0xc11/0x18d0 [ 2536.868099] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2536.868797] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2536.869585] new_sync_write+0x42c/0x660 [ 2536.870188] ? new_sync_read+0x6f0/0x6f0 [ 2536.870799] ? ksys_write+0x12d/0x260 [ 2536.871388] ? lock_release+0x680/0x680 [ 2536.871992] ? selinux_file_permission+0x92/0x520 [ 2536.872721] ? __fget_files+0x296/0x4c0 [ 2536.873338] vfs_write+0x747/0xa70 [ 2536.873883] ksys_write+0x12d/0x260 [ 2536.874434] ? __ia32_sys_read+0xb0/0xb0 [ 2536.875052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2536.875849] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2536.876625] do_syscall_64+0x33/0x40 [ 2536.877193] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2536.877965] RIP: 0033:0x7f1b43d12b19 [ 2536.878529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2536.881286] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2536.882435] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2536.883511] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2536.884579] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2536.885646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2536.886717] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:34:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x6ffd) 09:34:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x8ffd) 09:34:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x7ffd) 09:34:31 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000106800) 09:34:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 94) [ 2537.091124] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:34:31 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:34:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 89) [ 2537.186526] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:34:31 executing program 3: mq_open(&(0x7f0000000100)='\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r3, 0x0, r2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x41, 0x0) fcntl$dupfd(r3, 0x406, r4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r1, 0x0, r0) readv(r1, &(0x7f0000001500)=[{&(0x7f0000000180)=""/181, 0xb5}, {&(0x7f0000000240)=""/165, 0xa5}, {&(0x7f0000000300)=""/75, 0x4b}, {&(0x7f0000000380)=""/79, 0x4f}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/122, 0x7a}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/61, 0x3d}], 0x8) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x6]}, 0x8, 0x800) mq_timedsend(r5, &(0x7f0000000040)="2e606d42a83927ed7d11147bb4f5094f557dd6d1dab01bb82e2f9d7fc0b9602d1d6252c1be4d14a0b2beaa09fe0c2c8ff02f76f20f6b52e648d64a1263e6881ef67604f8b912e22461b3b8480a466bf3995d62fde5ac2464ae5f4bb91b3d187d161a2073e1bbf4dda67c9adabc467d8cef38d24bf974c5abf3c437836f6593d7f3a300de18e2363600b153a0f41871b680f7208d5d4774eccf768d34484f67f472b6e8b819037023f194ab888b122a9a2e21f4d1b8a965a4f79002c951c8ebea", 0xc0, 0x1ff, &(0x7f0000000140)={0x0, 0x3938700}) [ 2537.245392] FAULT_INJECTION: forcing a failure. [ 2537.245392] name failslab, interval 1, probability 0, space 0, times 0 [ 2537.247386] CPU: 1 PID: 13462 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2537.248416] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2537.249629] Call Trace: [ 2537.250013] dump_stack+0x107/0x167 [ 2537.250535] should_fail.cold+0x5/0xa [ 2537.251075] ? create_object.isra.0+0x3a/0xa20 [ 2537.251747] should_failslab+0x5/0x20 [ 2537.252291] kmem_cache_alloc+0x5b/0x310 [ 2537.252877] create_object.isra.0+0x3a/0xa20 [ 2537.253498] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2537.254254] kmem_cache_alloc+0x159/0x310 [ 2537.254856] alloc_buffer_head+0x20/0x110 [ 2537.255452] alloc_page_buffers+0x14d/0x700 [ 2537.256066] create_empty_buffers+0x2c/0x640 [ 2537.256684] ? start_this_handle+0xfdd/0x1390 [ 2537.257316] ? start_this_handle+0xd57/0x1390 [ 2537.257951] create_page_buffers+0x1bb/0x230 [ 2537.258575] __block_write_begin_int+0x1d1/0x19c0 [ 2537.259266] ? ext4_da_release_space+0x480/0x480 [ 2537.259969] ? kmem_cache_alloc+0x2a6/0x310 [ 2537.260585] ? remove_inode_buffers+0x300/0x300 [ 2537.261251] ? jbd2__journal_start+0xf3/0x7e0 [ 2537.261899] ext4_da_write_begin+0x37d/0xd40 [ 2537.262565] ? ext4_write_begin+0x10f0/0x10f0 [ 2537.263200] ? copyout_mc+0x140/0x140 [ 2537.263783] generic_perform_write+0x20a/0x4f0 [ 2537.264442] ? page_cache_prev_miss+0x310/0x310 [ 2537.265099] ? down_write_killable+0x180/0x180 [ 2537.265759] ext4_buffered_write_iter+0x232/0x4a0 [ 2537.266443] ext4_file_write_iter+0xc11/0x18d0 [ 2537.267107] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2537.267767] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2537.268519] new_sync_write+0x42c/0x660 [ 2537.269083] ? new_sync_read+0x6f0/0x6f0 [ 2537.269659] ? ksys_write+0x12d/0x260 [ 2537.270210] ? lock_release+0x680/0x680 [ 2537.270806] ? selinux_file_permission+0x92/0x520 [ 2537.271509] ? __fget_files+0x296/0x4c0 [ 2537.272081] vfs_write+0x747/0xa70 [ 2537.272592] ksys_write+0x12d/0x260 [ 2537.273103] ? __ia32_sys_read+0xb0/0xb0 [ 2537.273683] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2537.274422] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2537.275150] do_syscall_64+0x33/0x40 [ 2537.275682] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2537.276405] RIP: 0033:0x7f8c54bcdb19 [ 2537.276949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2537.279522] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2537.280590] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2537.281587] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2537.282585] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2537.283590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2537.284581] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2537.307020] FAULT_INJECTION: forcing a failure. [ 2537.307020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2537.308961] CPU: 0 PID: 13549 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2537.309967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2537.311166] Call Trace: [ 2537.311576] dump_stack+0x107/0x167 [ 2537.312110] should_fail.cold+0x5/0xa [ 2537.312673] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2537.313462] generic_perform_write+0x279/0x4f0 [ 2537.314136] ? page_cache_prev_miss+0x310/0x310 [ 2537.314817] ? down_write_killable+0x180/0x180 [ 2537.315509] ext4_buffered_write_iter+0x232/0x4a0 [ 2537.316216] ext4_file_write_iter+0xc11/0x18d0 [ 2537.316895] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2537.317568] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2537.318311] new_sync_write+0x42c/0x660 [ 2537.318894] ? new_sync_read+0x6f0/0x6f0 [ 2537.319485] ? ksys_write+0x12d/0x260 [ 2537.320039] ? lock_release+0x680/0x680 [ 2537.320612] ? selinux_file_permission+0x92/0x520 [ 2537.321310] ? __fget_files+0x296/0x4c0 [ 2537.321894] vfs_write+0x747/0xa70 [ 2537.322414] ksys_write+0x12d/0x260 [ 2537.322940] ? __ia32_sys_read+0xb0/0xb0 [ 2537.323538] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2537.324290] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2537.325030] do_syscall_64+0x33/0x40 [ 2537.325562] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2537.326293] RIP: 0033:0x7f1b43d12b19 [ 2537.326832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2537.329444] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2537.330548] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2537.331573] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2537.332595] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2537.333620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2537.334637] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:34:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) 09:34:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x8ffd) [ 2550.544151] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=535 sclass=netlink_route_socket pid=13580 comm=syz-executor.3 [ 2550.555232] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=535 sclass=netlink_route_socket pid=13580 comm=syz-executor.3 [ 2550.577736] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:34:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 95) 09:34:44 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000106c00) 09:34:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x9ffd) 09:34:44 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfa", 0xd1, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:34:44 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:34:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 90) 09:34:44 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2550.606259] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2550.621222] FAULT_INJECTION: forcing a failure. [ 2550.621222] name failslab, interval 1, probability 0, space 0, times 0 [ 2550.622996] CPU: 0 PID: 13590 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2550.624046] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2550.625265] Call Trace: [ 2550.625786] dump_stack+0x107/0x167 [ 2550.626326] should_fail.cold+0x5/0xa [ 2550.626889] ? create_object.isra.0+0x3a/0xa20 [ 2550.627173] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2550.627581] should_failslab+0x5/0x20 [ 2550.629325] kmem_cache_alloc+0x5b/0x310 [ 2550.629925] ? lru_cache_add+0x45c/0x800 [ 2550.630534] create_object.isra.0+0x3a/0xa20 [ 2550.631182] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2550.631947] kmem_cache_alloc+0x159/0x310 [ 2550.632562] jbd2__journal_start+0x190/0x7e0 [ 2550.633221] __ext4_journal_start_sb+0x214/0x390 [ 2550.633923] ext4_da_write_begin+0x51f/0xd40 [ 2550.634583] ? ext4_write_begin+0x10f0/0x10f0 [ 2550.635237] ? copyout_mc+0x140/0x140 [ 2550.635820] generic_perform_write+0x20a/0x4f0 [ 2550.636504] ? page_cache_prev_miss+0x310/0x310 [ 2550.637187] ? down_write_killable+0x180/0x180 [ 2550.637868] ext4_buffered_write_iter+0x232/0x4a0 [ 2550.638580] ext4_file_write_iter+0xc11/0x18d0 [ 2550.639290] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2550.639972] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2550.640745] new_sync_write+0x42c/0x660 [ 2550.641345] ? new_sync_read+0x6f0/0x6f0 [ 2550.641963] ? ksys_write+0x12d/0x260 [ 2550.642526] ? lock_release+0x680/0x680 [ 2550.643109] ? selinux_file_permission+0x92/0x520 [ 2550.643825] ? __fget_files+0x296/0x4c0 [ 2550.644423] vfs_write+0x747/0xa70 [ 2550.644954] ksys_write+0x12d/0x260 [ 2550.645490] ? __ia32_sys_read+0xb0/0xb0 [ 2550.646091] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2550.646865] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2550.647643] do_syscall_64+0x33/0x40 [ 2550.648189] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2550.648940] RIP: 0033:0x7f8c54bcdb19 [ 2550.649485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2550.652191] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2550.653300] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2550.654339] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2550.655376] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2550.656424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2550.657467] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2550.699535] FAULT_INJECTION: forcing a failure. [ 2550.699535] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2550.701574] CPU: 0 PID: 13596 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2550.702600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2550.703821] Call Trace: [ 2550.704219] dump_stack+0x107/0x167 [ 2550.704763] should_fail.cold+0x5/0xa [ 2550.705329] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2550.706124] generic_perform_write+0x279/0x4f0 [ 2550.706806] ? page_cache_prev_miss+0x310/0x310 [ 2550.707503] ? down_write_killable+0x180/0x180 [ 2550.708205] ext4_buffered_write_iter+0x232/0x4a0 [ 2550.708926] ext4_file_write_iter+0xc11/0x18d0 [ 2550.709609] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2550.710287] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2550.711070] new_sync_write+0x42c/0x660 [ 2550.711676] ? new_sync_read+0x6f0/0x6f0 [ 2550.712280] ? ksys_write+0x12d/0x260 [ 2550.712852] ? lock_release+0x680/0x680 [ 2550.713438] ? selinux_file_permission+0x92/0x520 [ 2550.714156] ? __fget_files+0x296/0x4c0 [ 2550.714773] vfs_write+0x747/0xa70 [ 2550.715313] ksys_write+0x12d/0x260 [ 2550.715864] ? __ia32_sys_read+0xb0/0xb0 [ 2550.716473] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2550.717247] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2550.718014] do_syscall_64+0x33/0x40 [ 2550.718568] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2550.719321] RIP: 0033:0x7f1b43d12b19 [ 2550.719886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2550.722569] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2550.723701] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2550.724755] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2550.725803] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2550.726856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2550.727910] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:34:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x9ffd) 09:34:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xaffd) [ 2550.762116] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. 09:34:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 96) 09:34:45 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000107400) [ 2550.912393] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2550.976280] FAULT_INJECTION: forcing a failure. [ 2550.976280] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2550.978335] CPU: 1 PID: 13709 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2550.979318] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2550.980492] Call Trace: [ 2550.980873] dump_stack+0x107/0x167 [ 2550.981388] should_fail.cold+0x5/0xa [ 2550.981933] __alloc_pages_nodemask+0x182/0x600 [ 2550.982592] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2550.983447] ? find_get_entry+0x2c8/0x740 [ 2550.984038] ? vmacache_find+0x55/0x2a0 [ 2550.984609] alloc_pages_current+0x187/0x280 [ 2550.985232] __page_cache_alloc+0x2d2/0x360 [ 2550.985850] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2550.986594] pagecache_get_page+0x2c7/0xc80 [ 2550.987204] ? asm_exc_page_fault+0x1e/0x30 [ 2550.987828] grab_cache_page_write_begin+0x64/0xa0 [ 2550.988528] ext4_da_write_begin+0x2f3/0xd40 [ 2550.989151] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2550.989902] ? ext4_write_begin+0x10f0/0x10f0 [ 2550.990535] ? copyout_mc+0x140/0x140 [ 2550.991093] generic_perform_write+0x20a/0x4f0 [ 2550.991760] ? page_cache_prev_miss+0x310/0x310 [ 2550.992424] ? down_write_killable+0x180/0x180 [ 2550.993116] ext4_buffered_write_iter+0x232/0x4a0 [ 2550.993798] ext4_file_write_iter+0xc11/0x18d0 [ 2550.994457] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2550.995108] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2550.995869] new_sync_write+0x42c/0x660 [ 2550.996433] ? new_sync_read+0x6f0/0x6f0 [ 2550.997010] ? ksys_write+0x12d/0x260 [ 2550.997551] ? lock_release+0x680/0x680 [ 2550.998113] ? selinux_file_permission+0x92/0x520 [ 2550.998798] ? __fget_files+0x296/0x4c0 [ 2550.999397] vfs_write+0x747/0xa70 [ 2550.999924] ksys_write+0x12d/0x260 [ 2551.000441] ? __ia32_sys_read+0xb0/0xb0 [ 2551.001023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2551.001763] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2551.002494] do_syscall_64+0x33/0x40 [ 2551.003016] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2551.003749] RIP: 0033:0x7f8c54bcdb19 [ 2551.004275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2551.006836] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2551.007957] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2551.008956] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2551.009948] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2551.010979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2551.011965] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:35:04 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:35:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xbffd) 09:35:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0x31b) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={[0x8001]}, 0x8, 0x100000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r2, &(0x7f0000000400)="aadbda1f90abc609", 0x8, 0x0, &(0x7f0000001400)={0x2, 0x0, @remote}, 0x10) r3 = dup(r2) close(r3) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', r1, &(0x7f0000000140)='./file1\x00', 0x2) mq_open(&(0x7f0000000100)='.)-(]\x00', 0x800, 0x0, 0x0) 09:35:04 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000107a00) 09:35:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 91) 09:35:04 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e", 0xd3, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:35:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 97) 09:35:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xaffd) [ 2569.992386] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2570.024471] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2570.027347] FAULT_INJECTION: forcing a failure. [ 2570.027347] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2570.029271] CPU: 1 PID: 13824 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2570.030268] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2570.031455] Call Trace: [ 2570.031854] dump_stack+0x107/0x167 [ 2570.032387] should_fail.cold+0x5/0xa [ 2570.032974] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2570.033750] generic_perform_write+0x279/0x4f0 [ 2570.034404] ? page_cache_prev_miss+0x310/0x310 [ 2570.035065] ? down_write_killable+0x180/0x180 [ 2570.035743] ext4_buffered_write_iter+0x232/0x4a0 [ 2570.036432] ext4_file_write_iter+0xc11/0x18d0 [ 2570.037095] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2570.037755] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2570.038499] new_sync_write+0x42c/0x660 [ 2570.039076] ? new_sync_read+0x6f0/0x6f0 [ 2570.039662] ? ksys_write+0x12d/0x260 [ 2570.040221] ? lock_release+0x680/0x680 [ 2570.040793] ? selinux_file_permission+0x92/0x520 [ 2570.041483] ? __fget_files+0x296/0x4c0 [ 2570.042063] vfs_write+0x747/0xa70 [ 2570.042574] ksys_write+0x12d/0x260 [ 2570.043100] ? __ia32_sys_read+0xb0/0xb0 [ 2570.043690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2570.044434] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2570.045169] do_syscall_64+0x33/0x40 [ 2570.045700] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2570.046430] RIP: 0033:0x7f8c54bcdb19 [ 2570.046972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2570.049555] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2570.050628] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2570.051634] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2570.052658] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2570.053670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2570.054691] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2570.059583] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:35:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 98) [ 2570.115544] FAULT_INJECTION: forcing a failure. [ 2570.115544] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2570.117928] CPU: 0 PID: 13840 Comm: syz-executor.6 Not tainted 5.10.215 #1 09:35:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xbffd) [ 2570.118938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2570.120233] Call Trace: [ 2570.120627] dump_stack+0x107/0x167 [ 2570.121156] should_fail.cold+0x5/0xa [ 2570.121719] __alloc_pages_nodemask+0x182/0x600 [ 2570.122397] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2570.123267] ? find_get_entry+0x2c8/0x740 [ 2570.123879] ? vmacache_find+0x55/0x2a0 [ 2570.124464] alloc_pages_current+0x187/0x280 [ 2570.125103] __page_cache_alloc+0x2d2/0x360 [ 2570.125729] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2570.126501] pagecache_get_page+0x2c7/0xc80 [ 2570.127125] ? asm_exc_page_fault+0x1e/0x30 [ 2570.127758] grab_cache_page_write_begin+0x64/0xa0 [ 2570.128472] ext4_da_write_begin+0x2f3/0xd40 [ 2570.129112] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2570.129868] ? ext4_write_begin+0x10f0/0x10f0 [ 2570.130509] ? copyout_mc+0x140/0x140 [ 2570.131079] generic_perform_write+0x20a/0x4f0 [ 2570.131759] ? page_cache_prev_miss+0x310/0x310 [ 2570.132432] ? down_write_killable+0x180/0x180 [ 2570.133103] ext4_buffered_write_iter+0x232/0x4a0 [ 2570.133808] ext4_file_write_iter+0xc11/0x18d0 [ 2570.134489] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2570.135167] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2570.135941] new_sync_write+0x42c/0x660 [ 2570.136520] ? new_sync_read+0x6f0/0x6f0 [ 2570.137112] ? ksys_write+0x12d/0x260 [ 2570.137671] ? lock_release+0x680/0x680 [ 2570.138248] ? selinux_file_permission+0x92/0x520 [ 2570.138951] ? __fget_files+0x296/0x4c0 [ 2570.139537] vfs_write+0x747/0xa70 [ 2570.140075] ksys_write+0x12d/0x260 [ 2570.140613] ? __ia32_sys_read+0xb0/0xb0 [ 2570.141204] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2570.141960] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2570.142708] do_syscall_64+0x33/0x40 [ 2570.143249] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2570.143994] RIP: 0033:0x7f1b43d12b19 [ 2570.144536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2570.147146] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2570.148246] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2570.149273] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2570.150296] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2570.151319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2570.152353] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 [ 2570.235618] FAULT_INJECTION: forcing a failure. [ 2570.235618] name failslab, interval 1, probability 0, space 0, times 0 [ 2570.237599] CPU: 1 PID: 13914 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2570.238609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2570.239819] Call Trace: [ 2570.240213] dump_stack+0x107/0x167 [ 2570.240751] should_fail.cold+0x5/0xa [ 2570.241309] ? create_object.isra.0+0x3a/0xa20 [ 2570.241970] should_failslab+0x5/0x20 [ 2570.242518] kmem_cache_alloc+0x5b/0x310 [ 2570.243120] ? lru_cache_add+0x45c/0x800 [ 2570.243727] create_object.isra.0+0x3a/0xa20 [ 2570.244363] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2570.245102] kmem_cache_alloc+0x159/0x310 [ 2570.245700] jbd2__journal_start+0x190/0x7e0 [ 2570.246356] __ext4_journal_start_sb+0x214/0x390 [ 2570.247045] ext4_da_write_begin+0x51f/0xd40 [ 2570.247703] ? ext4_write_begin+0x10f0/0x10f0 [ 2570.248360] ? copyout_mc+0x140/0x140 [ 2570.248934] generic_perform_write+0x20a/0x4f0 [ 2570.249600] ? page_cache_prev_miss+0x310/0x310 [ 2570.250285] ? down_write_killable+0x180/0x180 [ 2570.250958] ext4_buffered_write_iter+0x232/0x4a0 [ 2570.251656] ext4_file_write_iter+0xc11/0x18d0 [ 2570.252331] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2570.253008] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2570.253779] new_sync_write+0x42c/0x660 [ 2570.254364] ? new_sync_read+0x6f0/0x6f0 [ 2570.254961] ? ksys_write+0x12d/0x260 [ 2570.255519] ? lock_release+0x680/0x680 [ 2570.256107] ? selinux_file_permission+0x92/0x520 [ 2570.256806] ? __fget_files+0x296/0x4c0 [ 2570.257397] vfs_write+0x747/0xa70 [ 2570.257928] ksys_write+0x12d/0x260 [ 2570.258448] ? __ia32_sys_read+0xb0/0xb0 [ 2570.259046] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2570.259816] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2570.260558] do_syscall_64+0x33/0x40 [ 2570.261103] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2570.261843] RIP: 0033:0x7f8c54bcdb19 [ 2570.262388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2570.265035] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2570.266140] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2570.267174] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2570.268218] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2570.269258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2570.270292] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 09:35:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcffd) 09:35:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0x31b) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={[0x8001]}, 0x8, 0x100000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r2, &(0x7f0000000400)="aadbda1f90abc609", 0x8, 0x0, &(0x7f0000001400)={0x2, 0x0, @remote}, 0x10) r3 = dup(r2) close(r3) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', r1, &(0x7f0000000140)='./file1\x00', 0x2) mq_open(&(0x7f0000000100)='.)-(]\x00', 0x800, 0x0, 0x0) 09:35:04 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:35:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcffd) [ 2570.381054] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:35:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 92) 09:35:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 99) 09:35:04 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:35:04 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e", 0xd3, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:35:04 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2570.559138] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2570.577034] FAULT_INJECTION: forcing a failure. [ 2570.577034] name failslab, interval 1, probability 0, space 0, times 0 [ 2570.578953] CPU: 1 PID: 14058 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2570.579968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2570.581144] Call Trace: [ 2570.581532] dump_stack+0x107/0x167 [ 2570.582063] should_fail.cold+0x5/0xa [ 2570.582611] ? jbd2__journal_start+0x190/0x7e0 [ 2570.583273] should_failslab+0x5/0x20 [ 2570.583827] kmem_cache_alloc+0x5b/0x310 [ 2570.584421] jbd2__journal_start+0x190/0x7e0 [ 2570.585064] __ext4_journal_start_sb+0x214/0x390 [ 2570.585759] ext4_da_write_begin+0x51f/0xd40 [ 2570.586409] ? ext4_write_begin+0x10f0/0x10f0 [ 2570.587053] ? copyout_mc+0x140/0x140 [ 2570.587607] generic_perform_write+0x20a/0x4f0 [ 2570.588290] ? page_cache_prev_miss+0x310/0x310 [ 2570.588963] ? down_write_killable+0x180/0x180 [ 2570.589629] ext4_buffered_write_iter+0x232/0x4a0 [ 2570.590330] ext4_file_write_iter+0xc11/0x18d0 [ 2570.591003] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2570.591674] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2570.592438] new_sync_write+0x42c/0x660 [ 2570.593017] ? new_sync_read+0x6f0/0x6f0 [ 2570.593600] ? ksys_write+0x12d/0x260 [ 2570.594153] ? lock_release+0x680/0x680 [ 2570.594724] ? selinux_file_permission+0x92/0x520 [ 2570.595416] ? __fget_files+0x296/0x4c0 [ 2570.596009] vfs_write+0x747/0xa70 [ 2570.596529] ksys_write+0x12d/0x260 [ 2570.597054] ? __ia32_sys_read+0xb0/0xb0 [ 2570.597638] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2570.598402] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2570.599149] do_syscall_64+0x33/0x40 [ 2570.599706] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2570.600442] RIP: 0033:0x7f1b43d12b19 [ 2570.600981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2570.603582] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2570.604691] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2570.605709] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2570.606739] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2570.607772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2570.608813] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:35:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdffd) [ 2570.629126] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2570.644468] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2570.662066] FAULT_INJECTION: forcing a failure. [ 2570.662066] name failslab, interval 1, probability 0, space 0, times 0 [ 2570.664076] CPU: 1 PID: 14071 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2570.665081] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2570.666274] Call Trace: [ 2570.666668] dump_stack+0x107/0x167 [ 2570.667212] should_fail.cold+0x5/0xa [ 2570.667788] ? create_object.isra.0+0x3a/0xa20 [ 2570.668459] should_failslab+0x5/0x20 [ 2570.669017] kmem_cache_alloc+0x5b/0x310 [ 2570.669614] create_object.isra.0+0x3a/0xa20 [ 2570.670256] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2570.671018] kmem_cache_alloc+0x159/0x310 [ 2570.671627] alloc_buffer_head+0x20/0x110 [ 2570.672244] alloc_page_buffers+0x14d/0x700 [ 2570.672876] create_empty_buffers+0x2c/0x640 [ 2570.673516] ? start_this_handle+0xfdd/0x1390 [ 2570.674171] ? start_this_handle+0xd57/0x1390 [ 2570.674825] create_page_buffers+0x1bb/0x230 [ 2570.675469] __block_write_begin_int+0x1d1/0x19c0 [ 2570.676186] ? ext4_da_release_space+0x480/0x480 [ 2570.676882] ? kmem_cache_alloc+0x2a6/0x310 [ 2570.677521] ? remove_inode_buffers+0x300/0x300 [ 2570.678198] ? jbd2__journal_start+0xf3/0x7e0 [ 2570.678867] ext4_da_write_begin+0x37d/0xd40 [ 2570.679529] ? ext4_write_begin+0x10f0/0x10f0 [ 2570.680191] ? copyout_mc+0x140/0x140 [ 2570.680773] generic_perform_write+0x20a/0x4f0 [ 2570.681453] ? page_cache_prev_miss+0x310/0x310 [ 2570.682135] ? down_write_killable+0x180/0x180 [ 2570.682813] ext4_buffered_write_iter+0x232/0x4a0 [ 2570.683520] ext4_file_write_iter+0xc11/0x18d0 [ 2570.684223] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2570.684896] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2570.685666] new_sync_write+0x42c/0x660 [ 2570.686250] ? new_sync_read+0x6f0/0x6f0 [ 2570.686841] ? ksys_write+0x12d/0x260 [ 2570.687410] ? lock_release+0x680/0x680 [ 2570.688004] ? selinux_file_permission+0x92/0x520 [ 2570.688708] ? __fget_files+0x296/0x4c0 [ 2570.689298] vfs_write+0x747/0xa70 [ 2570.689829] ksys_write+0x12d/0x260 [ 2570.690379] ? __ia32_sys_read+0xb0/0xb0 [ 2570.690979] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2570.691747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2570.692495] do_syscall_64+0x33/0x40 [ 2570.693040] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2570.693782] RIP: 0033:0x7f8c54bcdb19 [ 2570.694330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2570.696998] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2570.698115] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2570.699145] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2570.700185] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2570.701223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2570.702256] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2583.435510] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:35:17 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e", 0xd3, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:35:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdffd) 09:35:17 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:35:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 100) 09:35:17 executing program 1: stat(&(0x7f0000000580)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000240)='./file1\x00', 0x7fffffff, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000500)="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", 0x1000, 0x79}], 0x81440, &(0x7f0000000300)={[{@journal_path={'journal_path', 0x3d, './file1'}}, {@journal_async_commit}, {@auto_da_alloc}, {@journal_dev={'journal_dev', 0x3d, 0xd4}}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r0}}]}) clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r4 = fcntl$dupfd(r3, 0x0, r2) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) syz_io_uring_setup(0x4e37, &(0x7f00000003c0)={0x0, 0x22d, 0x4, 0xffffffff, 0x289, 0x0, r4}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000100)) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:35:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 93) 09:35:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xeffd) 09:35:17 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='./file0\x00']) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x4}, 0x6) lsetxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@md5={0x1, "bedebf1ed1da139ef8ee28538cb9ec49"}, 0x11, 0x6) r1 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r1, &(0x7f00000002c0)=""/139, 0x8b, 0x6) [ 2583.458191] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2583.501557] FAULT_INJECTION: forcing a failure. [ 2583.501557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2583.503823] CPU: 1 PID: 14095 Comm: syz-executor.0 Not tainted 5.10.215 #1 [ 2583.504884] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.506118] Call Trace: [ 2583.506537] dump_stack+0x107/0x167 [ 2583.506613] FAULT_INJECTION: forcing a failure. [ 2583.506613] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.507092] should_fail.cold+0x5/0xa [ 2583.507129] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2583.507172] generic_perform_write+0x279/0x4f0 [ 2583.510785] ? page_cache_prev_miss+0x310/0x310 [ 2583.511500] ? down_write_killable+0x180/0x180 [ 2583.512297] ext4_buffered_write_iter+0x232/0x4a0 [ 2583.513079] ext4_file_write_iter+0xc11/0x18d0 [ 2583.513790] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2583.514491] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2583.515300] new_sync_write+0x42c/0x660 [ 2583.515918] ? new_sync_read+0x6f0/0x6f0 [ 2583.516534] ? ksys_write+0x12d/0x260 [ 2583.517122] ? lock_release+0x680/0x680 [ 2583.517719] ? selinux_file_permission+0x92/0x520 [ 2583.518452] ? __fget_files+0x296/0x4c0 [ 2583.519072] vfs_write+0x747/0xa70 [ 2583.519616] ksys_write+0x12d/0x260 [ 2583.520188] ? __ia32_sys_read+0xb0/0xb0 [ 2583.520813] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2583.521587] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2583.522367] do_syscall_64+0x33/0x40 [ 2583.522934] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2583.523694] RIP: 0033:0x7f8c54bcdb19 [ 2583.524307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2583.527091] RSP: 002b:00007f8c52143188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2583.528275] RAX: ffffffffffffffda RBX: 00007f8c54ce0f60 RCX: 00007f8c54bcdb19 [ 2583.529344] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2583.530411] RBP: 00007f8c521431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2583.531473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2583.532581] R13: 00007ffde1b7ffbf R14: 00007f8c52143300 R15: 0000000000022000 [ 2583.533782] CPU: 0 PID: 14098 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2583.534812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.536021] Call Trace: [ 2583.536418] dump_stack+0x107/0x167 [ 2583.536954] should_fail.cold+0x5/0xa [ 2583.537514] ? create_object.isra.0+0x3a/0xa20 [ 2583.538217] should_failslab+0x5/0x20 [ 2583.538792] kmem_cache_alloc+0x5b/0x310 [ 2583.539402] ? lru_cache_add+0x45c/0x800 [ 2583.540013] create_object.isra.0+0x3a/0xa20 [ 2583.540648] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2583.541393] kmem_cache_alloc+0x159/0x310 [ 2583.542010] jbd2__journal_start+0x190/0x7e0 [ 2583.542667] __ext4_journal_start_sb+0x214/0x390 [ 2583.543400] ext4_da_write_begin+0x51f/0xd40 [ 2583.544125] ? ext4_write_begin+0x10f0/0x10f0 [ 2583.544789] ? copyout_mc+0x140/0x140 [ 2583.545365] generic_perform_write+0x20a/0x4f0 [ 2583.546062] ? page_cache_prev_miss+0x310/0x310 [ 2583.546752] ? down_write_killable+0x180/0x180 [ 2583.547457] ext4_buffered_write_iter+0x232/0x4a0 [ 2583.548164] ext4_file_write_iter+0xc11/0x18d0 [ 2583.548864] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2583.549558] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2583.550380] new_sync_write+0x42c/0x660 [ 2583.551014] ? new_sync_read+0x6f0/0x6f0 [ 2583.551605] ? ksys_write+0x12d/0x260 [ 2583.552173] ? lock_release+0x680/0x680 [ 2583.552755] ? selinux_file_permission+0x92/0x520 [ 2583.553459] ? __fget_files+0x296/0x4c0 [ 2583.554090] vfs_write+0x747/0xa70 [ 2583.554620] ksys_write+0x12d/0x260 [ 2583.555188] ? __ia32_sys_read+0xb0/0xb0 [ 2583.555786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2583.556558] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2583.557308] do_syscall_64+0x33/0x40 [ 2583.557854] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2583.558595] RIP: 0033:0x7f1b43d12b19 [ 2583.559137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2583.561802] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2583.562977] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2583.564010] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2583.565045] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2583.566132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2583.567195] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:35:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xeffd) 09:35:17 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='./file0\x00']) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x4}, 0x6) lsetxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@md5={0x1, "bedebf1ed1da139ef8ee28538cb9ec49"}, 0x11, 0x6) r1 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r1, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:35:17 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1/file0\x00', 0x107142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) [ 2596.232101] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2596.247883] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:35:30 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:35:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1000003) 09:35:30 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:35:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1000003) 09:35:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:35:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 94) 09:35:30 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:35:30 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='./file0\x00']) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x4}, 0x6) lsetxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@md5={0x1, "bedebf1ed1da139ef8ee28538cb9ec49"}, 0x11, 0x6) r1 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r1, &(0x7f00000002c0)=""/139, 0x8b, 0x6) [ 2596.269115] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2596.301812] FAULT_INJECTION: forcing a failure. [ 2596.301812] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2596.302939] CPU: 0 PID: 14326 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2596.303537] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2596.304281] Call Trace: [ 2596.304518] dump_stack+0x107/0x167 [ 2596.304847] should_fail.cold+0x5/0xa [ 2596.305188] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2596.305661] generic_perform_write+0x279/0x4f0 [ 2596.306067] ? page_cache_prev_miss+0x310/0x310 [ 2596.306475] ? down_write_killable+0x180/0x180 [ 2596.306887] ext4_buffered_write_iter+0x232/0x4a0 [ 2596.307308] ext4_file_write_iter+0xc11/0x18d0 [ 2596.307729] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2596.308141] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2596.308627] new_sync_write+0x42c/0x660 [ 2596.308975] ? new_sync_read+0x6f0/0x6f0 [ 2596.309331] ? ksys_write+0x12d/0x260 [ 2596.309674] ? lock_release+0x680/0x680 [ 2596.310030] ? selinux_file_permission+0x92/0x520 [ 2596.310468] ? __fget_files+0x296/0x4c0 [ 2596.310826] vfs_write+0x747/0xa70 [ 2596.311142] ksys_write+0x12d/0x260 [ 2596.311462] ? __ia32_sys_read+0xb0/0xb0 [ 2596.311823] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2596.312282] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2596.312734] do_syscall_64+0x33/0x40 [ 2596.313067] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2596.313514] RIP: 0033:0x7f1b43d12b19 [ 2596.313849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2596.315480] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2596.316146] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2596.316778] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2596.317433] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2596.318077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2596.318721] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:35:30 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='./file0\x00']) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x4}, 0x6) lsetxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@md5={0x1, "bedebf1ed1da139ef8ee28538cb9ec49"}, 0x11, 0x6) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:35:30 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000000)) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000080)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x3, 0x0, r3, &(0x7f00000000c0)={0x8080, 0x197, 0x10}, &(0x7f0000000100)='./file1/file0\x00', 0x18, 0x0, 0x23456}, 0xfffffffa) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x38, 0x0, 0x202, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 09:35:30 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:35:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 95) [ 2596.484902] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:35:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xffd) 09:35:30 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='./file0\x00']) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x4}, 0x6) lsetxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@md5={0x1, "bedebf1ed1da139ef8ee28538cb9ec49"}, 0x11, 0x6) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/139, 0x8b, 0x6) [ 2596.510153] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:35:30 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2596.540087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14442 comm=syz-executor.1 [ 2596.550504] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2596.566578] FAULT_INJECTION: forcing a failure. [ 2596.566578] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2596.567648] CPU: 1 PID: 14451 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2596.568213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2596.568870] Call Trace: [ 2596.569087] dump_stack+0x107/0x167 [ 2596.569388] should_fail.cold+0x5/0xa [ 2596.569711] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2596.570154] generic_perform_write+0x279/0x4f0 [ 2596.570531] ? page_cache_prev_miss+0x310/0x310 [ 2596.570920] ? down_write_killable+0x180/0x180 [ 2596.571300] ext4_buffered_write_iter+0x232/0x4a0 [ 2596.571687] ext4_file_write_iter+0xc11/0x18d0 [ 2596.572080] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2596.572449] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2596.572887] new_sync_write+0x42c/0x660 [ 2596.573211] ? new_sync_read+0x6f0/0x6f0 [ 2596.573541] ? ksys_write+0x12d/0x260 [ 2596.573852] ? lock_release+0x680/0x680 [ 2596.574176] ? selinux_file_permission+0x92/0x520 [ 2596.574572] ? __fget_files+0x296/0x4c0 [ 2596.574902] vfs_write+0x747/0xa70 [ 2596.575202] ksys_write+0x12d/0x260 [ 2596.575495] ? __ia32_sys_read+0xb0/0xb0 [ 2596.575830] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2596.576263] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2596.576683] do_syscall_64+0x33/0x40 [ 2596.576983] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2596.577385] RIP: 0033:0x7f1b43d12b19 [ 2596.577684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2596.579120] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2596.579746] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2596.580333] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2596.580915] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2596.581483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2596.582063] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:35:30 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='./file0\x00']) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x4}, 0x6) lsetxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@md5={0x1, "bedebf1ed1da139ef8ee28538cb9ec49"}, 0x11, 0x6) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:35:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 96) 09:35:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1ffd) [ 2596.729307] FAULT_INJECTION: forcing a failure. [ 2596.729307] name failslab, interval 1, probability 0, space 0, times 0 [ 2596.730259] CPU: 0 PID: 14560 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2596.730821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2596.731491] Call Trace: [ 2596.731727] dump_stack+0x107/0x167 [ 2596.732042] should_fail.cold+0x5/0xa [ 2596.732351] ? create_object.isra.0+0x3a/0xa20 [ 2596.732733] should_failslab+0x5/0x20 [ 2596.733048] kmem_cache_alloc+0x5b/0x310 [ 2596.733377] ? lru_cache_add+0x45c/0x800 [ 2596.733720] create_object.isra.0+0x3a/0xa20 [ 2596.734083] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2596.734500] kmem_cache_alloc+0x159/0x310 [ 2596.734840] jbd2__journal_start+0x190/0x7e0 [ 2596.735207] __ext4_journal_start_sb+0x214/0x390 [ 2596.735600] ext4_da_write_begin+0x51f/0xd40 [ 2596.735971] ? ext4_write_begin+0x10f0/0x10f0 [ 2596.736335] ? copyout_mc+0x140/0x140 [ 2596.736655] generic_perform_write+0x20a/0x4f0 [ 2596.737047] ? page_cache_prev_miss+0x310/0x310 [ 2596.737435] ? down_write_killable+0x180/0x180 [ 2596.737815] ext4_buffered_write_iter+0x232/0x4a0 [ 2596.738204] ext4_file_write_iter+0xc11/0x18d0 [ 2596.738573] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2596.738938] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2596.739365] new_sync_write+0x42c/0x660 [ 2596.739688] ? new_sync_read+0x6f0/0x6f0 [ 2596.740035] ? ksys_write+0x12d/0x260 [ 2596.740352] ? lock_release+0x680/0x680 [ 2596.740678] ? selinux_file_permission+0x92/0x520 [ 2596.741074] ? __fget_files+0x296/0x4c0 [ 2596.741397] vfs_write+0x747/0xa70 [ 2596.741683] ksys_write+0x12d/0x260 [ 2596.741976] ? __ia32_sys_read+0xb0/0xb0 [ 2596.742308] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2596.742730] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2596.743139] do_syscall_64+0x33/0x40 [ 2596.743444] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2596.743873] RIP: 0033:0x7f1b43d12b19 [ 2596.744182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2596.745669] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2596.746286] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2596.746869] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2596.747450] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2596.748046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2596.748611] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:35:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x2000ffaf) 09:35:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:35:43 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="98d56d918b1a38630f071a84954d6c7060dc9619b88cce6d64fbb0a34d821d2ed4e6d8120ae2ab11aba1e80d6c858d4053fd1c60c33f146ade3232dda595046001c3387018bf317a8aa4bc9d0c6a88bb7c438f5a24fd7387be2511a28143cfd267267b7a1e3fc44c2e7b014c75321b37dd6b5442b9aeef702233ea511279a13e74861bf7da146f034bbe381643a7a63e89344bc5e8bd1124060e11940250f3485bf68996179272081e8c89aa9d9f9f02d3650b800d7e7b5d293b84f7ab8c26489d1f4906a14a6cbb7cd55554a17880c8f38341dd627479dc4fe44d72503e9c072a7d9cc868a0461c989a1fa22aa0369dd61b4711a8631b2ed977d80c30dab3e2", @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='./file0\x00']) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x4}, 0x6) r1 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r1, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:35:43 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:35:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) stat(&(0x7f0000000580)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() tkill(r5, 0x7) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, r5, 0x7, 0xffffffffffffffff, 0x1) kcmp$KCMP_EPOLL_TFD(r5, 0x0, 0x7, r4, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e80)={0x180, 0x1a, 0xc21, 0x0, 0x0, {0xd}, [@typed={0x8, 0x67, 0x0, 0x0, @ipv4=@empty}, @nested={0xc, 0x15, 0x0, 0x1, [@typed={0x8, 0x3d, 0x0, 0x0, @uid=r3}]}, @typed={0x8, 0x8b, 0x0, 0x0, @u32=0xffffff7f}, @generic="82546e2ce449521bac83386252b95a124ecbed9449d2b0ddbe40d539b30372aa52342ad0e496d1f704be9be1b338a0eb02abf934fcfbc63e581d93ac1629bf2112c10320d92b8d11d290d0a4b7c1bede2fc6286f5b73d9d4d2a2adf2cf99a34b2a6c9df84ad492c1f14a74d70b08efedee6e207b0ec2", @typed={0xc, 0x20, 0x0, 0x0, @u64}, @typed={0x14, 0x3f, 0x0, 0x0, @ipv6=@private0}, @nested={0xa3, 0x18, 0x0, 0x1, [@generic="0521881357ab58d36a2a968ac1b44c29fc1da0d1fce2030e5f3ef7fe986a4c2f25b9a7c4bb6a58fb3696d1d49924459b7f19d74cb457a7b2006965a3fec85ad0f5e71824d327eedf179906989e1d26feff1d47da86e07304f2496371ceddfdd968c82f6d8739ab14bb1431561c1bfc96fa606a90b67edfe9b0387c79b9861ef28faecc2be0751fbe802735bda4433a628476c6", @typed={0xc, 0x6e, 0x0, 0x0, @u64=0xfff}]}, @typed={0xc, 0x25, 0x0, 0x0, @str=')/\x80M/-@\x00'}, @typed={0x8, 0x6f, 0x0, 0x0, @uid=0xee01}]}, 0x180}}, 0x20004041) ioctl$TIOCSIG(r2, 0x40045436, 0xe) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0x40086607, &(0x7f00000004c0)=0x10000100000) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xa, 0xff, 0x3, 0x4, 0x0, 0x7f, 0x10800, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x8, 0x6, 0x3ff, 0x9, 0xfffffffffffffffe, 0x2, 0x8, 0x0, 0x7}, 0x0, 0x6, r2, 0x1) sendfile(r6, r6, &(0x7f0000000000)=0xffffffffffff6af4, 0x0) r7 = openat$cgroup(r6, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) sched_getaffinity(r5, 0x8, &(0x7f0000000180)) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x100000c, 0x10, r7, 0xc9a18000) 09:35:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x2ffd) 09:35:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 97) 09:35:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x2000ffaf) [ 2609.109322] FAULT_INJECTION: forcing a failure. [ 2609.109322] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2609.110343] CPU: 1 PID: 14579 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2609.110893] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2609.111565] Call Trace: [ 2609.111787] dump_stack+0x107/0x167 [ 2609.112091] should_fail.cold+0x5/0xa [ 2609.112428] __alloc_pages_nodemask+0x182/0x600 [ 2609.112806] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2609.113303] ? find_get_entry+0x2c8/0x740 [ 2609.113652] ? vmacache_find+0x55/0x2a0 [ 2609.113993] alloc_pages_current+0x187/0x280 [ 2609.114357] __page_cache_alloc+0x2d2/0x360 [ 2609.114713] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2609.114917] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2609.115146] pagecache_get_page+0x2c7/0xc80 [ 2609.115158] ? asm_exc_page_fault+0x1e/0x30 [ 2609.115177] grab_cache_page_write_begin+0x64/0xa0 [ 2609.117547] ext4_da_write_begin+0x2f3/0xd40 [ 2609.117910] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2609.118336] ? ext4_write_begin+0x10f0/0x10f0 [ 2609.118702] ? copyout_mc+0x140/0x140 [ 2609.119028] generic_perform_write+0x20a/0x4f0 [ 2609.119410] ? page_cache_prev_miss+0x310/0x310 [ 2609.119791] ? down_write_killable+0x180/0x180 [ 2609.120182] ext4_buffered_write_iter+0x232/0x4a0 [ 2609.120573] ext4_file_write_iter+0xc11/0x18d0 [ 2609.120947] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2609.121317] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2609.121745] new_sync_write+0x42c/0x660 [ 2609.122071] ? new_sync_read+0x6f0/0x6f0 [ 2609.122399] ? ksys_write+0x12d/0x260 [ 2609.122715] ? lock_release+0x680/0x680 [ 2609.123030] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2609.123479] vfs_write+0x747/0xa70 [ 2609.123770] ksys_write+0x12d/0x260 [ 2609.124064] ? __ia32_sys_read+0xb0/0xb0 [ 2609.124410] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2609.124840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2609.125260] do_syscall_64+0x33/0x40 [ 2609.125569] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2609.125984] RIP: 0033:0x7f1b43d12b19 [ 2609.126282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2609.127759] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2609.128376] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2609.128948] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2609.129527] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2609.129915] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2609.130106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2609.130122] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:35:43 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='./file0\x00']) r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r0, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:35:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 98) 09:35:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x3ffd) [ 2609.270978] FAULT_INJECTION: forcing a failure. [ 2609.270978] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2609.272003] CPU: 1 PID: 14670 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2609.272574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2609.273246] Call Trace: [ 2609.273475] dump_stack+0x107/0x167 [ 2609.273773] should_fail.cold+0x5/0xa [ 2609.274088] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2609.274535] generic_perform_write+0x279/0x4f0 [ 2609.274919] ? page_cache_prev_miss+0x310/0x310 [ 2609.275297] ? down_write_killable+0x180/0x180 [ 2609.275673] ext4_buffered_write_iter+0x232/0x4a0 [ 2609.276070] ext4_file_write_iter+0xc11/0x18d0 [ 2609.276468] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2609.276843] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2609.277277] new_sync_write+0x42c/0x660 [ 2609.277598] ? new_sync_read+0x6f0/0x6f0 [ 2609.277944] ? ksys_write+0x12d/0x260 [ 2609.278253] ? lock_release+0x680/0x680 [ 2609.278585] ? selinux_file_permission+0x92/0x520 [ 2609.278977] ? __fget_files+0x296/0x4c0 [ 2609.279308] vfs_write+0x747/0xa70 [ 2609.279600] ksys_write+0x12d/0x260 [ 2609.279896] ? __ia32_sys_read+0xb0/0xb0 [ 2609.280241] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2609.280660] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2609.281084] do_syscall_64+0x33/0x40 [ 2609.281390] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2609.281806] RIP: 0033:0x7f1b43d12b19 [ 2609.282113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2609.283608] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2609.284245] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2609.284822] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2609.285405] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2609.285978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2609.286561] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:35:43 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r0, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:35:43 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) fcntl$getown(r0, 0x9) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:35:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x4ffd) [ 2609.380053] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:35:43 executing program 3: r0 = mq_open(0x0, 0x0, 0x0, 0x0) pread64(r0, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:35:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 99) [ 2609.573095] FAULT_INJECTION: forcing a failure. [ 2609.573095] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2609.574995] CPU: 0 PID: 14812 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2609.576003] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2609.577199] Call Trace: [ 2609.577594] dump_stack+0x107/0x167 [ 2609.578129] should_fail.cold+0x5/0xa [ 2609.578693] __alloc_pages_nodemask+0x182/0x600 [ 2609.579375] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2609.580263] ? find_get_entry+0x2c8/0x740 [ 2609.580867] ? vmacache_find+0x55/0x2a0 [ 2609.581457] alloc_pages_current+0x187/0x280 [ 2609.582104] __page_cache_alloc+0x2d2/0x360 [ 2609.582733] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2609.583500] pagecache_get_page+0x2c7/0xc80 [ 2609.584146] ? asm_exc_page_fault+0x1e/0x30 [ 2609.584785] grab_cache_page_write_begin+0x64/0xa0 [ 2609.585507] ext4_da_write_begin+0x2f3/0xd40 [ 2609.586149] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2609.586912] ? ext4_write_begin+0x10f0/0x10f0 [ 2609.587555] ? copyout_mc+0x140/0x140 [ 2609.588130] generic_perform_write+0x20a/0x4f0 [ 2609.588815] ? page_cache_prev_miss+0x310/0x310 [ 2609.589494] ? down_write_killable+0x180/0x180 [ 2609.590172] ext4_buffered_write_iter+0x232/0x4a0 [ 2609.590882] ext4_file_write_iter+0xc11/0x18d0 [ 2609.591563] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2609.592237] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2609.593008] new_sync_write+0x42c/0x660 [ 2609.593592] ? new_sync_read+0x6f0/0x6f0 [ 2609.594185] ? ksys_write+0x12d/0x260 [ 2609.594744] ? lock_release+0x680/0x680 [ 2609.595320] ? selinux_file_permission+0x92/0x520 [ 2609.596028] ? __fget_files+0x296/0x4c0 [ 2609.596633] vfs_write+0x747/0xa70 [ 2609.597164] ksys_write+0x12d/0x260 [ 2609.597693] ? __ia32_sys_read+0xb0/0xb0 [ 2609.598287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2609.599044] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2609.599795] do_syscall_64+0x33/0x40 [ 2609.600350] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2609.601092] RIP: 0033:0x7f1b43d12b19 [ 2609.601644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2609.604289] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2609.605389] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2609.606415] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2609.607442] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2609.608476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2609.609499] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 [ 2623.234425] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:35:57 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1d, 0x6, 0x7, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000080)=0x4, 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) stat(&(0x7f0000000580)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r6, 0x0, r5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001c80)=ANY=[@ANYBLOB="201200005200200000000000000000000a000000da000380762d63e275769de46c89b70499b44a712deed9f89c2d06e959ff85736408008f00", @ANYRES32=r6, @ANYBLOB='\b\x00\f\x00', @ANYRES32=r7, @ANYBLOB="fc797f51adf88fb84a12bed9a454d769842ff6c18c8a6409abf9ddced1e18af28384d562b6468e810a7bdebc730061d5c83f71c838b70c61ccb2510028cc95a27041d88ca01eb39b1605067b26173249e98ae965765339f5bda03cf4f5bad4ba2855118e083bd6685b8daf7447325660b318d3d021fe396a0d887c12c5c4ecd32cb63caed310510452ab71ecd9b6a0bc73cb253bde8805266d0800130077673100080043000e5ec70000002d017e80ed81ebba4fd316f420ce23d0c14203c6a8b339b690d82bf333e352a8c31345ddd270f1c1711e3e9738b6ac023b29fe708a125d98818f4408c2f468b608001900", @ANYRES32=r7, @ANYBLOB="bb7c9cf5ce9ea6001d5973be86131d99e11c1ae612e314003100ff010000000000000000000000000001312c90dba7b7b73f380bd2cbfcdf10d4cc7ea50f0cb302377e574ac81e344e7b844ed107d3665142f6bea1f29754b242b49ecdb672ef4cebeb922f1c5040558d0ca791e974801a385ebf478ea34216abd3fdad3e95c4349ef99941765793ea1c1451a737f47858bca193739d7c2f384fc2a236f073609ff1212a7fe5fade5c63f1e42e69b6cac46622f473f231390a9ccae04d0a2dbd90ff266764281d23b709c8a0048a454c23e31d9ad42cccbc1c0b2ebe9b2e31a92ee35b580800000005d8bed76a385b4bb056aee5572621ec442afb3e05040ce73bc4bd6f3dfbf9ed3f033a6bc5c11bff3a972e1dbede4e6317451d744d991b17a330eebd8aedebc1f93cd67b4273201b101cc9e964d9480d0d401e513cb28a2479f46fc91fdf3d7fb4618b6cbcad4d0c54a99958277e2b9fd8b4f143c67b9403a8dee3334c2f7c8a2a735022b32b03f755084cb65abff891114115bca89f98d42ec1f6b2c1d8032964adf67e888483a6edaacce0d9b48e9c2caf4c13e5f7a502a6a678b7d7bce7c409d48d51267972c14329b8500867d975b7a91b3de2810015f504c4f683e47b88a496eec7a189b63b04f06a4e8b219216ed65f3749a17677d9bbcd7c635765c57c792aba387c4bfbc6a3549c5350c6eca20712122b7e92b0949ee07d75e771a7e7980177d29bf54dffd2fe58b920dbd3bf106abeea47c51f32a2dcb116f66a261a9f5188e650f0a3a553b68a5698d2915bf69c7e8d9dbf4b05f19debd521ab8870479388417e295fdb5db7460791396b49f43a8db837829ea0123473f5845d89e5e5fc80edda798aeeabbc179cbd6a53ef6bf38e01376d2b318ae747ee3eb9a9f49c9814ec87a6a94b43f96c23167e810dc67e474d5d34da1db3b26512eabbc61037ef243d186e93d5658e82c55a5735ab355bf78e35696c30299b7c5f799514ef6d2e179fc2a0fa3570caf97f43123114cd934e761e2ff0dcfef0c7e9f3358878f452294070eb5d11eea3807fe8438fe8eb8060c4278e6ea3b4f30272198fd53f98927ece71e0b207d3c1f41e1fa42facc84aed50d29e5bb44254c09439cd65e407c4cf812879aecc756f9872e7b9560fdd726c2bd486b63423b498c4b58982eed7e4131203426a4060efe36e47307fdb2ffb73d8923c9d0c2734ab15c7201d5b7d9ae6e9d9e7764812f41051da7a8efe47bd316a7f9be3cded9784c67b7989f7acc3b7a533491e3cfe197d9572cf8a8df681abd00529fe4892308b5a16ee69d7168d3a12223e0a24a75934dcf5a4b9516f4c2b9bf668a921b3a8c355bd12f9dcd037872a4e74debcb4e501184ef2b62900c8f891995fe3d654dbe7170f75a88be4358bd6be489edb89cd0e6332dcf8537dc59078bac115b7896a210c4e64841d31b092d85b53a2a13f3a0388ffb0eb5fc14c6096de83301244132a3255d83e790ba4b505ec365eaacae74d82bd6b2c4c334f0e60f790436a89f1c2ffd8ad25df2a87bad867c04d5988c017e98b922b9a00fa1f81b4c3d70930ee55daefff2807dca7de1fddd02c7ffa8ffddbf19aef3db63c752ebee92a1924c41b06cc00851e5fd0a3925b2341477467ee2d990cc570941b5145547e4f1fcae9fe9f40fb3fc2218ed31a0965055bffd8381c9382285e0194357194c0ee1c692b4ec92a7f8a9f5de03a0605714744dddb3580c0110255d06e48be9779b669940cc33fd1f8f742c115a5704842ab27cfb10efd8590737f0a2b82e91b9866528deedfe91ef8fd2042a1f2b8e74e967b460c3f8b63740fb979294ed831b793cc3cbb998d1e0490487dd8ec3337d8b8b0dd4d926d5496ed0c1c5a2ac325ed134d9b92d140b845e420ae5c9f8f5c44b2321e1a61bb435896115f9b4bd266d674025c8b42217960c1b42c7fc8817266cbaacb34fc758f0fabe042c9f8b0be29946ec4cb243799677ef6f275bd9da85da5af88cd3702b012006290bbfc78290157750c0d3ca3b72bfbad64a73d5487cecebfffbe4835dfb0c66fcda557755696613c90aafe0f4cb0eda5f8e88e0f591b08f110797d2933b97dd25c8f4ab9a1f93f34ec6291a0fa4a08bf2988138c07a5a6b47311a2360f5c86fdd47cf5baaa368b3d585b1b25dbff6799fc344da52715bd1dabc2cbd58dd85a5c7c6e3df91180705a240961fcae5d50eff0f0538d5d007458b13dd3d87fc43d9101766a75932baf1d9cb45491e2fd12c1319830e91bb4b89d0a99f6042db0a951e63ed54a50620c3b9c3f26a01fc775c7d1f263a7360977a34c500431e264c093009d16a704a2791fcdf567525dbd88b78507cfe4f70cd45f56125dd192c5a3b23600e6b53debb83fa15bbd0fafe5f13aea4b946448766ae03513f6b845e2b60c977438f2286ed7ffae45893834f7b8a307abb5354573066bcc8e86ffaa2beea3d27e173cf873343db53b704929c8d7cda2f021a5dce330b3acca803abdbfca9cda7add680a46c5719e71b0e3314f1ea87ca796ff2fbf928b159077bea7f45d693e31b5e26605221638ea9bf6451877a83ca674336a68d54e25599a220da0b3214e49befaf7036a1865747da5d17706feb6b6e6b2c83e437ede9ba1ea32667c1cfcb4714c717207468bda83150d1ae0ebf3e8e7cc98f6ed4247dbca8a242f80fef110da956ec9d5b46ed5dd124682bd4e6becd04e7fcd53465d5062bbf94ab99511afcaf5c20a4a7fe22753062776e6421ec5804309e02dd65a1306f068360750c6362dfb3abc78b76b773570291796e27c6ff5ab58e419a334aacb0847d0d80b7d005c735ee9e1db36e0b610571912d119900bbf9aae12bcfafc3e306b2a2b68799f684aa734683cc0d97e3766b95d2f4417df6536c906b52fe6b7809407aeec4dd41ced9580fc232603afc46f959a4651bc410efd7ef6428fb603dfafc2eac4378750163c999db1a0b70a846c166fdcb951c5c6a0adb7ed2a07ba7cf25864db7bac7190f9437babd9f9c18de999f078514a6998622e8fb31947b010ed57775d5a21d2094d1941015bb9c868d7750f81ff44ae2795e31286f232be5cd67423beb4d662636a2edae00ab1f255b90c0bfb2d4288d6aa8aa74519e83b70b6c0d8cc70e41fe0b5162bca0570c326c7ee0dd94329ed5404b26fc5177fb927e4e9aaa77f83070a5dd203d7a89bfd18c5c0885d033cf54370334947ed84c258e5facb58e2005549ab52edc408a80bde265c6515b41e03a0c102149d40c791b41a1cb5f4938d09f7c41ec8a50ab91eec885caab688030962609bfcb8b1acf349e04e397cb468f9498221acab7e0fff3d9877809db4592d3d097d4d3a8c30f1c84426b34a5786c9d00d661f565eeaeafbbc10f0d18302ab91408bde914c51a8697237032eaa072ccf9d8434c89da53df539550fa403ce653c621257666ae5dbd6199a964ddbbe3fa53b0ffb77fb7fe88fd3ed72da75ab893aa1bdada98bbc9c24bc252908bfae9efa58b1c1232f9cfd389ba7accca568a0b8d792587395dffae75658ecfefa1dbf4c2dda66ce9ae481ffaa923816945fd176c7b12851381b57f6538f65aa0cde32b74dbaa32b6f309af9dfcc4cea2e72536f39c92937d71fa864143dad2b5bd2193e5d39c980148637bacbb0ff3264993862ebddb20d4fc5c156cd506817b6d476684c526723a977cd5a63032f531cc01883e7a4de9797ac406a57c3e00a2d2ca3c47161aa0e13fa685881a155f75236ebf099041b4f4d066b8ef36b0d3ea59fe031223cbf0494ec1607ff1c7d54eafb161a4e83d6c47ea174edb81429372b53e4a1d5ffd4082d757a47ec89774faf9174e042f2fd258fb5fcead838c8ee86e73c728e2d6977934d3a85beac9d8a431936f128e874ea7adfbdea9002f4f6fe8761fdc218a3b42d5e38d25c55eaec339845552f4051690159416873ce50eced06c33ba5a29123132a6111026f7a82ec85b4ed41f50fbd039ab151baa898cdce3e53087555833ea89a4660521206f04539361df0bcfed0ffcdae2ca476687eb56b938634ffb56a994cee872755bd7b54bc27e69b959a54b87bc0a3552e5c01536209c3d6d568e74f937a76b6bce9941830dd64d695fefac5a5ae827537a5e9845c3eb01f61a916085bf2e3db9e118541bf0240cd1ef560a19825f656389931bdd444984beb3f44c47def1d6548b1ed904890ee1f233a50391f4dce7e9fc3ced66961824662494c006aa1b8fbd91a4be122787d0e5cbea5c94bb6bcbcb1db47917fe8d4855db1128fb8d4e74f9fb6f8c563b3c410297f1eaa0924526cf2a3b69a733d70652ac85cd8e9d91555f698c688763164f9435c2cefaf4f1d462b782a317b801d9f13183f5a00d34cf967754e267ef72aaaddd9190ea3719cc93f01011e048553f8678b99c581bd58bedc8cfcde86e26b375d40ed75f13342068cffba49877375a13eb0f9854365907f92087a73a6c1338cf00d3ff6e8079ea463e83576316f3aaea01613810d607a43746a0a72bccf1a9dc16ef8ebc9b2b04433b5d869b8175e9334429ed87ef28909758ba601d6583c4d2a72d6e114d836e14542df0a441d024fc9314e4a9177cf6fc49715f5c26a0a9651b186526be9a513f917cfebd153aab9bd515391df53b5d93a16b642a79a27685c223fb404969d0b68d6d25caa0599c3e421ac94245110dbd44253581f53806352404812c5c4b14e1ed51fbdb4e8bf9252baef6a1a350db9d3b5cb43687ca8f613fd931f07eb634ffe5e73c5987cc9334e8206774775ddf2a41b44995369b4a449c08ce306fa21170fc969f391c2880dd8805407d70235b1811fec400e64b56ab0fbc49436951049185fd6b8c6bf3699102eb5ca3d5869a0bb643d7eac4f6ff7ad7115d13f3a14e0abf32f661642f41a433c0835da50da05f1af1a8481aeb2e43d890b0aa92247b75586df081b9a3f01a601c27a6b8b9ef3cae96b0fe7b8f3984eb406f3f923ed0715be2b722472797c3f77b9e2555fc533358e597efe2220b9af1e02fbc7d5a9ee627bc48a874fd6029790e6ad9311fbd5bd46772aed9814bd0e345acbd1e2dfa09fa328bcb991a9e2bcae40a2c47ec08a686ac6423631e70c5108843b20d6e1cf852b473b2c4cf206b7267d4bf3ff3b02f6e723d7896c8ce2b26d3c0f9b99d2d0966ab5c7d6d3cedf6ca69976cc1c4017bfd641d02506cbdb59f5600356e4486129ab4167d01c03c882f045d567838e77ce568655bff15a0462293d594bda21a8b1bc7231f40037c7734736979e87e8e17da8c1b658718a515b30a209692c676705bbf8a1f7f75fe1a5371e4e7049a1d9cfdffa85d95f272f1ee608aa820a3002ec006f9c7f126793be62450464637761711020d8314f104aeb386383a5159408f91de811964cc5650c3df681ee40df2f6a087daae2b38cf0857e820b85d9f341289c50bb47ffd7edee5c7efc33a152a447b5a8eb26c4280b9442f0bc9c6982c9922856a7a5d0eb946db49a638ed6a01bd64b7deec543a54e28e6da81e2910a93d9d943cded133061145ef15060ac75b712e9b2c52b5747112fa4b95f3b7d6a5efcdf8406c8e4991e96496f8a3864ae2c16e4eeb9d4791217c6161f5dc0dac37cd6321c1ed27934a89668a074df19ccc5c40655c59bb8a48188003a4d91cfaef8bad79c5378e08f52e1bf48791baeede876e1fc0716bd5210ed79cb54e39082ba39a698c1451fe8375dc4a04602ebbaeb67197f0bebef0a0514d433743e79541354a086372b35595386f36e4dd48f1b95a803a279c04930f2fe07489fa4260834a64910894511b5230247e8ed8724ddce3a93ac38744b982691e550782020a868526327dd6da04067735e25561c61acc847fb9744c9d69a8ab260a0523928b51287aac6052e9b563cef1f847d93ee76c7da5104315601c03ea56f2ad333305d055a4ba67c66c549f3bf70578dde0c07c2c9c311ba38bfe0fa271a7480612a2433576e200af6c68fc94e4352134cfbddca63fa19958b5f6be715d2784c1eb1fa633079ce2ca96a9801381176f659d1e75ecf0cb7c15a44bbe95851c29f6d64000783b849cc131a85e511234f32d872184100c003a68d5c5b7bc20c276ac1bc1656deb8a596b484290cd77a3be62141a0a59a71203ad62a1c55c8d9460fd814a0def9d86c40d4090af26ae7c737b9ceaa202b4adbef4688e6f9b4eb97822988734b691c7dfb3b9fe6d1da6bb06a95d6300d3d918f3b96c8a8e29ea318582f2b0545b8b8ab9bebab612b1a57973f9f543b0c4c313defbe9b246b5e7495d494caf326dd308ec0de36b03cf3e760c5a9fb207ac78b24444eaeb18e035711360a7ed54ce55e9c14b8a01"], 0x1220}}, 0x800) r8 = openat(r3, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_NOP={0x0, 0x2}, 0x81) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000100)={0x6, 'wg1\x00', {0x80000000}, 0x2}) ioctl$EXT4_IOC_GROUP_EXTEND(r8, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:35:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfffffdef) 09:35:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfffffdef) 09:35:57 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), 0x0, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:35:57 executing program 3: r0 = mq_open(0x0, 0x0, 0x0, 0x0) pread64(r0, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:35:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:35:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x5ffd) 09:35:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 100) [ 2623.267476] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:35:57 executing program 3: r0 = mq_open(0x0, 0x0, 0x0, 0x0) pread64(r0, &(0x7f00000002c0)=""/139, 0x8b, 0x6) [ 2623.279983] FAULT_INJECTION: forcing a failure. [ 2623.279983] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2623.283620] CPU: 1 PID: 14834 Comm: syz-executor.6 Not tainted 5.10.215 #1 [ 2623.284351] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2623.285240] Call Trace: [ 2623.285533] dump_stack+0x107/0x167 [ 2623.285923] should_fail.cold+0x5/0xa [ 2623.286338] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2623.286919] generic_perform_write+0x279/0x4f0 [ 2623.287414] ? page_cache_prev_miss+0x310/0x310 [ 2623.287915] ? down_write_killable+0x180/0x180 [ 2623.288433] ext4_buffered_write_iter+0x232/0x4a0 [ 2623.288957] ext4_file_write_iter+0xc11/0x18d0 [ 2623.289456] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2623.289947] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2623.290519] new_sync_write+0x42c/0x660 [ 2623.290952] ? new_sync_read+0x6f0/0x6f0 [ 2623.291404] ? ksys_write+0x12d/0x260 [ 2623.291821] ? lock_release+0x680/0x680 [ 2623.292271] ? selinux_file_permission+0x92/0x520 [ 2623.292799] ? __fget_files+0x296/0x4c0 [ 2623.293238] vfs_write+0x747/0xa70 [ 2623.293626] ksys_write+0x12d/0x260 [ 2623.294014] ? __ia32_sys_read+0xb0/0xb0 [ 2623.294445] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2623.295003] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2623.295547] do_syscall_64+0x33/0x40 [ 2623.295947] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2623.296507] RIP: 0033:0x7f1b43d12b19 [ 2623.296910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2623.298884] RSP: 002b:00007f1b41288188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2623.299685] RAX: ffffffffffffffda RBX: 00007f1b43e25f60 RCX: 00007f1b43d12b19 [ 2623.300452] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2623.301230] RBP: 00007f1b412881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2623.301993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2623.302768] R13: 00007ffe579da18f R14: 00007f1b41288300 R15: 0000000000022000 09:35:57 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:35:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x6ffd) 09:35:57 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:35:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:35:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2623.569340] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:35:57 executing program 1: clone3(&(0x7f0000000140)={0x150e9100, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x2c2, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080), 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) write$cgroup_int(r3, &(0x7f0000000100)=0x6, 0x12) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000200)) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = gettid() tkill(r7, 0x7) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, r7, 0x7, 0xffffffffffffffff, 0x1) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000240)=0x0) kcmp(r7, r8, 0x3, r5, r5) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r6, 0x0, r5) ioctl$BTRFS_IOC_SPACE_INFO(r6, 0xc0109414, &(0x7f0000000500)={0x9b6, 0x20, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) 09:35:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x7ffd) 09:35:57 executing program 3: mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/139, 0x8b, 0x6) 09:36:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x400ff40bffd) 09:36:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:36:11 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x6) 09:36:11 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), 0x0, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:36:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xffd) 09:36:11 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r2, 0x0, r1) fcntl$dupfd(r0, 0x406, r2) 09:36:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x8ffd) 09:36:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x400ff40bffd) [ 2636.789443] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2636.797402] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2636.805531] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:36:11 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x6) 09:36:11 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x6) 09:36:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1ffd) 09:36:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x9ffd) 09:36:11 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) [ 2637.122203] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:36:11 executing program 3: r0 = mq_open(&(0x7f0000000100)='.+-)]\x00', 0x0, 0x0, 0x0) pread64(r0, &(0x7f00000002c0)=""/139, 0x8b, 0x0) 09:36:11 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), 0x0, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:36:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x2ffd) [ 2637.297284] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:36:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffdef) 09:36:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffdef) 09:36:24 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:36:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xaffd) 09:36:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x3ffd) 09:36:24 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r7 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0xf7, 0x3, 0x3, 0x0, 0x3da2, 0x8404a, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000080), 0x9}, 0x14001, 0x4ca, 0x3, 0x6, 0x6, 0x68, 0x9, 0x0, 0xffffffff, 0x0, 0x7}, r0, 0x4, r0, 0x2) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r9, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r10 = fcntl$dupfd(r9, 0x0, r8) sendmsg$nl_generic(r10, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000001c0)=[r0, r0, r3, r6, r7, r0, r10], 0x7) 09:36:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x2ffd) 09:36:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2650.301015] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2650.335200] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2650.372285] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:36:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="005200210c040000402298dd58243cb0f1f6e8a400004e1a42b4df8699"], 0x14}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r4, 0x0, r3) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100), 0x40000, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="1c006b000000000000", @ANYRESHEX=r3, @ANYBLOB=',afid=0x000000007fffffff,cache=loose,subj_type=security.capability\x00,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r5, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x200183, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) read(0xffffffffffffffff, &(0x7f0000000380)=""/156, 0x9c) ioctl$FS_IOC_FSSETXATTR(r5, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r5, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r5, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:36:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x4ffd) 09:36:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), 0x0, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:36:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xbffd) 09:36:24 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2650.496336] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. 09:36:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r3, 0x0, r2) r4 = fcntl$dupfd(r1, 0x406, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f00000000c0)={0x0, 0xd9e, 0x800000, 0x0, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) [ 2650.556723] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:36:24 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x13, 0xc21, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r6 = fcntl$dupfd(r5, 0x0, r4) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) pidfd_getfd(r3, r6, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) [ 2650.606752] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2663.302985] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. 09:36:37 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:36:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcffd) 09:36:37 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:36:37 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2663.332136] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2663.342923] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2663.361388] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:36:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x5ffd) 09:36:37 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000005200210c00000000000000001a0f2b295e7f52cab35c1f0b4d19cc491ea80f4c521e090000002000007a4b702c6410a437d9df0c657ad2ae9536704321fa6959317c4bc88c038b45e9567b4dec0137f491ab5d04a46da418b1"], 0x14}}, 0x0) syz_io_uring_setup(0x3bb9, &(0x7f0000000080)={0x0, 0xea91, 0x20, 0x3, 0x28e, 0x0, r3}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300), r0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x78, r4, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x1) 09:36:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cb80)={0xfffffffffffffffe, [{}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000057340)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x7f, "272dcf2989b8f2"}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:36:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r1) sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r2, 0x200, 0x70bd25, 0x6, {{}, {@void, @void}}, [@NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x4}, @NL80211_ATTR_BSS_HT_OPMODE={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x8040}, 0x24008805) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL, 0x0) r5 = syz_io_uring_setup(0x106, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) syz_io_uring_submit(r3, r7, &(0x7f0000000180)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r1, &(0x7f00000000c0)=0x80, &(0x7f0000000100)=@alg, 0x0, 0x800}, 0x5c8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:36:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x6ffd) 09:36:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdffd) 09:36:37 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) r1 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r6, 0x0, r5) syz_io_uring_submit(0x0, r3, &(0x7f0000000080)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r6, 0x0, &(0x7f0000000000)="ed8ec09e", 0x4, 0x41, 0x1}, 0xfff) r7 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x6, 0x6, &(0x7f0000001680)=[{&(0x7f0000000240)="e5943e57e2da152a3e487b521d02ed86186433652bfaf2ed38b915ef6bc538e61c84f649fa8bec4fac", 0x29, 0xfd04}, {&(0x7f0000000340)="e410e839475a2d2ae1c5ac0ed71e12b560b74f0d51278d097f0f8cc6d7d7f893634da183e51a47f796f3aa396db33a52385f8fb421f01cd1b57646c21b0559143c92722373dd45433d5dbc369ea10c0af93719cf2e03b9577fff016c00828cba5ff5c2dc553977f811ffe8fe0aa1ead1d74e4ef29a74923b4a9ed502cba082ab2a99302d349dec5decc43317acbd31c0aed430b8af58ae3ab58f", 0x9a, 0x5}, {&(0x7f0000000500)="a6d7ba1a32be326adcc449639b27ec911e2a85f44913073f17ade5be2ee5386da499b58d0e0eab6c67cf6ecb1b356f72a22d6209f201d4d2020e7d435465b7c3f1af626d3174a2f90c143fbc4864894869db4ac2d934b21d2dbf7c09a7fa4a96ad263f48917d17bbf237c7c65e35c91c599524b92f873bfec3faa50d877738cd98c35e02875f32b54fd346e7f609e9b1d535643def693d77c3798f0e2ebbe81d0af0f7b5427927babf88f75ebd60fe884df586c066ce355c58294065ce846d301f8a41f89b43975a14eebdc98acbc5", 0xcf, 0x7}, {&(0x7f0000000400)="4b334c2f24f89cae3ec8ce2f743006dccf9ff6f383592176bad032a3561f9f59af212fe75cdea2b7eb7cdf0d115c15233c9b0cbd3ee9e24673a8064ca53d748624f97c921e6068391f0faf86675ef8f7c1e9a4e5a4b4285b5d7b5622cb8e6772aafe7cbc27c473a14854bfeb4404f14e716897ac0f58cc36b6a64f0ea3cb711f026298aca14d6817995aae9dfbe0de5b28b92ce189762938ec9324daa2c00e909f", 0xa1, 0xffffffff00000001}, {&(0x7f0000000600)="9b93a3767f094872ece0394bdf5a13e2c201a67dda7d35a2d6ebab1a5b34e4a4c36e1e53ded403afaa95130577b5730a5a9cf5f0f4b8835c7141c4ac57440e71863de0", 0x43, 0x4}, {&(0x7f0000000680)="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", 0x1000, 0x9}], 0x200000, &(0x7f0000001740)={[{@huge_always}, {@huge_never}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@nr_blocks={'nr_blocks', 0x3d, [0x38, 0x6b, 0x37, 0x32]}}, {@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x31, 0x30, 0x65, 0x33, 0x6d, 0x32, 0x39]}}], [{@context={'context', 0x3d, 'sysadm_u'}}]}) openat(r7, &(0x7f0000000280)='./file1\x00', 0x40000, 0x22) [ 2663.609213] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:36:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000140)=0x6, 0x4) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2663.682005] tmpfs: Unsupported parameter 'huge' 09:36:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xeffd) 09:36:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x7ffd) 09:36:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cb80)={0xfffffffffffffffe, [{}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000057340)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x7f, "272dcf2989b8f2"}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:36:38 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:36:38 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:36:38 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) sendmsg$nl_generic(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x100, 0x14, 0x200, 0x70bd29, 0x25dfdbfb, {0x16}, [@generic="4dcee06cbc86983830ff956eb13b0b785bd1390619f496a9bcfb3bbb9504237d3269680ada1796fbd70957189067d8ee7594ee24fdd918fb4501873d79c9efa8c4407253f3fff9e80a7f21f12d48c8a20c1d31f5a355ef720f50faeaa18177601a00daa4166cbe2de15eacb7f581b1ca9724d637a61cb8a10ce83540ffdf9a62a2ab3d56ce5f0909a9da6f8898a854ba18d774e98a38e41f2dc28588207867b64bfbe59043f2c888899d1108cf103d968e995e10e8b2f67b0838a5ecacbcec9653c275d7716b4e211f9167c5c2de9790d20390a980f6515a62d7bd092ecfd5ede08036a605", @typed={0x4, 0x4a}]}, 0x100}, 0x1, 0x0, 0x0, 0x4004}, 0x844) 09:36:38 executing program 5: getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000900)) fchown(0xffffffffffffffff, 0x0, r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000006a80), 0xc100, 0x0) r2 = socket(0x25, 0x800, 0x8000) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() tkill(r4, 0x7) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, r4, 0x7, 0xffffffffffffffff, 0x1) kcmp$KCMP_EPOLL_TFD(r4, 0x0, 0x7, r3, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006d00)={{{@in=@dev, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000006e00)=0xe8) r7 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006e80)=[{{&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000140)="dab9b38d4bbd3e2041875a75d88221e3d00566e0f0e1eb4bab67a0ac992cbe91cea62c532f18377dee67a725d5", 0x2d}, {&(0x7f0000000180)="06b66661d9a2aebc93186416906ef613245f050c8427fd262b4e59ef7f962baf66fd738017a3335ddb74489a6955d6cabc58d2f94aa37accf2c1d4e48ebdce6c5db96d03574ee3477ad0d861943dfee981749e0325c919bf47259a77ba25045883a59cf16b574f9f4df5a16e20c7cb9572a818b0d5b50dba724a51513fc9f4ceecd52373b3c22d3712f4a3ddb053a809b94e22df0ff804d0d96577c44300086141ad912c7e0182066f468659032ee81c9763896c18c4f4498389115323c3a688222f5fd465c8c204536f7e77b055ee69a2f15000e5049e1f1ede283464fcdc", 0xdf}, {&(0x7f00000002c0)}, {&(0x7f0000000300)="d722ca4912c82f24d7e4d7d8bd48e9f5af1024c4a30681b5259015003b803ce18da66717cb20cec8f84e994e6e23e47aaca7c6a15fea906525d081e9c5", 0x3d}, {&(0x7f0000000340)="a838c6dd5131d732cfa323f45142c78c9337d11490eb58a818a3d0c60ad8c13ca3838d26192ff9225b542135f47f37d86b8b53c1d2707c18262af8db4fe309e8e9e8f5e5fce913dbc390eb41e878c5696f48eadc0feb784eb6cabc48e36614b4a24be365ce278a565f4e75538a531555a2ddd2fb764ab2b9606fb35a1a2007f67cd3c2efdeb937ad114839e4faa83cdbc852b62e3ca364fbeb742e06140d87220afe746e6f349ce7d93d", 0xaa}, {&(0x7f0000000480)="8b9045d7cab500ba55b1529f1f24a54ecfc13ac4d0a0b60c8215f9f5ca5efba92bf189743669efe0e8d7d4fd791c27fbb8af78c5ba740b7467cb3a04aff52000727375473065734805f7974df1ec8c5e96ac8b3334c2782b59c088d053ab3b9c53b27ce8c8794d38c6095a54b2", 0x6d}], 0x6, &(0x7f0000002c00)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x38, 0x4000}}, {{&(0x7f0000002c40)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003040)=[{&(0x7f0000002cc0)="764e78375f9ac8fa216552237305df6c9f6680f023eff895e1833f15699d9fb3715911eed9c654571a9544062be715a23c0b0ca5faa75b1beb4fd59b3826fd5b0d4f6916326c351c974961c4ac2657ecc2ba0c924047b7a020220daf982aa706baf97b4b1a80870410eb8398d17e2e830401288ed2d593bf5552c965198eca5a5c0865bef8ef3a86c4fa4acc89f908494a9f26e4e30435b35f6bf47a87e0f32b2d843a92cac0463acd2ac8e4ea43c8448635dc82e007ae99bee81b3a517a4d5cf36ff5d8c42b08a17f0d22e31eaf1fee5d165be09930fa76ae8bb5", 0xdb}, {&(0x7f0000002dc0)="7732dc226acec03a912599cde91762d9b58cbc23273b95f7b1c249b8a1f55a8965225bba7374a01fada07933d83bb34e78cde9e5032512fc487e845a770e0da6247e8a1eb67edd8b2a523513d462b27f5ea1d44658187183c2a2b1b5daf6515e8ff4bb1106459aafa506f020a4d8", 0x6e}, {&(0x7f0000002e40)="23462fbdb9bf959e5e0ffe2ba8956d81af44eeff8c0024a871c0761365158c7c3b800382dd435e36592955b42a7539c41d6acdb846f577f4b95c6a2604cd189a4c297136cea12998c9ca80c355363c7498d6e4743995541bbcc624076d0ca9e998d2460a8eff88fc88bce0f103877d9a00a8d8ab70a8df6663eea0b3252236d930a02ff1989a6e054601d761ffe85200ac320f587b7167317994f41df980d76a7f924fbd51e5d910a3da903573d99ea1210557cb637cff85e9ef624d31719dd6b60e85172286a5f6424a4a20d493e9f04937c312", 0xd4}, {&(0x7f0000002f40)="95d0f5552bcacb79791d2d34202e15dae7894a833ef9181385", 0x19}, {&(0x7f0000002f80)="78905be27cd43ed44552092bb6263dd404ab3946ba57385e00f657053e4b71bf661c538790c0c362229eae74d92015c5df237bf8ba89f4ff8b7c02b540ed9491f15ba398b650ef6d5cdf128a", 0x4c}, {&(0x7f0000003000)="7672b3ed5193df0932065e2aca74a89c9288693ad64530122c45707c8e293753e277b4804df53cde", 0x28}], 0x6, &(0x7f0000004140)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xf0, 0x2000c0d0}}, {{&(0x7f0000004240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004580)=[{&(0x7f00000042c0)="9d5a02d67be7196e3b05a30c49b8d48363b71519491988088bcd62bab95263e8d7b9cf519938600bc110a0e13ff809a79c2f000e5591275a47d4cd4d0ea62a80e002d303da2f24bcb124b8d48b75c5d28d54f96fdb35cbad07871a89e1da5c7df86f2f32aac5b8e3f603edc5a081b512b217c035f27bf0149e53b3b9cc68220311953ddc1000d2381bad599e8dcd2ac722b8babbc04e8900640a711423d2433f71bff57b0d0f24683452fffa11926063d4ae85f70b2ebc65e81555af7cd616c0d859c7e0cd2415da9c779e6eaac1ec7b10d71a2a6c51d95984df16b535a18471c2", 0xe1}, {&(0x7f00000043c0)="206ecf80ccf7cdd44b9bb1fe4e73f0abdde5d2cd9bd082e9e3be88d9655e854d5f1bd1396301091aa9077d21c116469633dd2ed719227ad89b360ab7cbd6b7a303fde00870aeb5cb677c6828522976efdd0c", 0x52}, {&(0x7f0000004440)="5529e3b8dcb07769fccdea847bab0d4926899a09e0d2c561f228248fc8ec6fb3d29eb7549a48379e1dc88a4466feff232244840c45e24302dccf1fd3dc83cdaa06adb5cbc2b007ae72b01e667156f06eb9303213834704092c652109d05f8c7b3c09c0ddd8", 0x65}, {&(0x7f00000044c0)="98d057ed12372cda6d976a1f43d11039358090bcc59d3d20e300419b35f0214ef1d2f1c560f1d32a97b450f6c96c77ab591fc9dbf32d6fc614673ade6b1e240d98c07246adf619753d420da90109791920ad7c5c157c78f8c61d93d1ebab66a704843a4b5a2eab88a43f44b226be85b6c49d022a1012eec6b2db3df39a4dbb12f937549572ed3159828a2f0df9021b93943fb03a22b4ae19e35fceddf75325003d86c08ba4041fc1c4f53552b83cec2e4a170ca7e8cebea4c4a4a0", 0xbb}], 0x4, 0x0, 0x0, 0x20000000}}, {{&(0x7f00000045c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000004900)=[{&(0x7f0000004640)="cc6e89cd85dcfed6702dbafdd12d695834e844dd4be8edadd56a4c37ae8006b08ecb9ec43c073ed83d032706dc303f512e8d11b034109435a3aa3eacb408ab8db8bf3eb4f5f778457cc1c98068672b5575a994400ea9a0c35048a3380f26c46cb5749026dd5080b819cd7d0de93630c9ae2b491d20b2f508083240dcc75381c1cfae5a23e65165dfed417a380e9bba8c807db0cbf7c12f26324e80152cfc8f6907c016", 0xa3}, {&(0x7f0000004700)="bc1ac8e697de7ea46b2740ebaf66652186fee0165d932d23a3a56ecb71107037bfd0926ac5012be7601f09a280a6e6b8aa6a8ff6a198f1e964a65d719fef44add9f3da92a14ab4987627792232bfadde4da807f2", 0x54}, {&(0x7f0000004780)="fafc813a804f4af02f7a1e7be1e982a7573b0f84d5df388351447a3f9880e373c00a7638244d9a072ea0c95e4cd349049905825b9c15c44dd6101eab0264192e01c0073d9d41e34eeb652f7edb495c753e4c128bb8e360f87a03bd27bfc3a54f883b08d84254", 0x66}, {&(0x7f0000004800)="74637358f715e92d8d35c3a5e349560f6403ff1dd6a9720b4000293aa78526e090cdb960edd9ac1f4193f8fc88c8bb5171a9b1fe7ab0b99e58802abe9e94cb395d6416539d71e81ec1f05adbeaae752e4a85873f92f1fe47805e54b0b1c3cda0fff11c0423f654a06a519c8841ae537de1c1da0b83e5aea843759b829a47c4798a9616f69da61d2c34bfd409fa442f8860ffb2604865e8b7c3873a67e9e49bead2e8f5c3057dbebb8f6f6e6bdad1d41f3c742096747ec157915dc332eec297522f3bce64", 0xc4}], 0x4, &(0x7f00000063c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, r0}}}], 0xc8, 0x4000000}}, {{0x0, 0x0, &(0x7f0000006a00)=[{&(0x7f00000064c0)="0134052079cd8e0ca4d2601284aad8cf7e06e3d8aada111cb55380741f7c6a4d3ab0d64492a5f7e3bb18f8bb625f647a921dc984a9657e6ebba9d3de6843ef2cb7133084201f89fd9d3fc3a507924f1cefddee593edb66680e7718ff49e73c27d259e5f62cab43626b1bf06d8a997a998274aab12413ed2b2cff30291f7018d87f00706e581e64a7b6a3556442c7795646e30844ca903ee22ea6f7637aee5f114baea5821a00b41eb1ee11a870ffb104237d7bcb7ace86a63f223bc46fe9394a9edde7fdab9b106533acdf764ce77f89a6002c68545c2e6ce453aa22a5a1618b178ba50b6f5facd75d4857e84a9f8453240e3d", 0xf3}, {&(0x7f00000065c0)="acbcac9fa87e63c8adecc2d67793b462d35dcbc030d0d675fa2ebaba8287a574579f61abdd59b135c4b19dd03f57d9b36d7ed137e9fc58ca06fc4a685e98d3e8c36c1595a94c35dacdbb1e97b71b6edb0065d2a973378649d89a7e175387bfc3bde9a46dffb0b3bbf4a56af989a3c71b6b79a978a20eddaf66b6c61ff7aa76a70bc0a605fab6edfd155c615e6051a4574c13c34695127a98543b197e2b5304a9c8fb7ee6d62e5095101f79b963f7aef13e34c58a6ebf6716789b33cf5e59f3558822f66d4e0143236f9564ba79783278018990949c034b53f28ba999cea1302f7216decb3bf1354769533b1f", 0xec}, {&(0x7f00000066c0)="0f826eab4180c10fdfdcda68fd5f2c65061ddee0d5964682eb2e58ae09fd6ceadaf2ef828b7087f11bc850560c4464267ed4cc82ddf587b941323df11115b6f055eca9d1a203c94f4b8af5022853c36a110c46cd68", 0x55}, {&(0x7f0000006740)="553f4cf98ea2f025b4229e4226a77b364eb14a38a0c9b97eef08ecae17e0557ccf3cd9ce8337cd554dd061bc0580835b8b8a73ab4dd1347dd93720cd2aecc18b47fca0669c64894f6d8bc6d99fc05d155177a7792ae209b723c508bc9624fd5569c50c4e49034c738da6663a418bdec09fb2fffd6812a2d3145a4cacde8ab7a6a33e4af519c58b0437b8f33de6dad89bbdbdf10a0e6b9e8b20a32e89c1bebb73642b728c1a0727", 0xa7}, {&(0x7f0000006800)="29b934307eb9af9db0364463cdad94f1b014a3a4fbaf6ff028880e80792d1a24cecdf17d064634ef52d629d4783a70813211bd4fdf702b66672d3d09ef0036e407786253416f38cad93d1e796a121ec1d1fd7cc5a86bb0d7a181a833c22217e96a8e25514dc92ca9645a36be75ddd270cf3deaa50b44e43b7321b0347e1c524cd4addfe7b6ca76fdf793510bdd41aced320c9a5e31b91f3d2843eaa4aae7eb570958b726448b91444709c535387212daa15b83ebf638e30d953f314651e5b78998b130cdaa462e034324a1d1c21031774bd339f23f9ab5", 0xd7}, {&(0x7f0000006900)="860bdabd3e8e03c54eec67670c5a046aecc33b3210f85ff9389cc8d5b11a1f4f6b6010f5d83366741ed33854c89f44f1b86d0cd08890560f90628113c9ce16699a3b12bfecc9b73b83620c11280b24f7e76873ceb53c1b3c1bf3c02ab5c9540c4fa107f03cfa11c7adc09b3263b70f01fbdf391f724dc2d3b4548988d98b05f8403bce79948c6c127e3dd588478a409fe0d598c840f5c93f256bd339f885576e58a3a850cfc1f25aad7297260c34917f66145afdf01ecfb1a267a1f7fdb4ef08a907fb322e56bed41063ae7d4315405096ad0fbcf43125715be1ce9acbde3dd5acb65bed94b01dc803fe2245e92e453608eac540eea437b0", 0xf8}], 0x6, &(0x7f0000006ac0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, 0xee00}}}], 0x70, 0x4800}}, {{0x0, 0x0, &(0x7f0000006cc0)=[{&(0x7f0000006b40)="73b58e4fed440e72ebfc0457a9d31c44978f472a398837a5076932b44a282e0292768a7008fbf22f6496cb08807cd693c56f3e6bd9931f7a053137383beec5d771d6d6f736c63e929c700061cd5e688d1534276ee05cb38f60ca6ca93a312ff21bde66967225671d7d16c7ba04778c0cdf3192375f75cfe05e812089ee0526f6355d9a34790242d0760ccd5289a7a64048220522606271ea98a7658bc650", 0x9e}, {&(0x7f0000006c00)="ef9a6b1541f58c4b310903d4338572a98f", 0x11}, {&(0x7f0000006c40)="2459c9bf531d12b9ccc4c07ec997658ea336483d6dd8acb0c53e4efc53a080dc7ae6f803eb03b830dd2cf9aa132abbea88287161c759b1ca9558b76443259367fb57c4dc9abc40b4b0db6f52c0baf47b5040e36a44", 0x55}], 0x3, &(0x7f0000006e40)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x20, 0x20000010}}], 0x6, 0x840) r8 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r8, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r8, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r8, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x10000}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r8, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2663.938251] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2663.941579] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:36:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x8ffd) 09:36:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) sendmsg$sock(r0, &(0x7f0000001980)={&(0x7f0000000480)=@llc={0x1a, 0xfffe, 0x3f, 0x20, 0x8, 0x7f}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)="8bbeac5904127158348a56df01c72b67bc45b6ef857a503c9bb4fd46416439bc0dd1eeb773de74b7e94209a65ae9dd21c96e459814db4bd37fd0b257be826a6099e067aa929f1751b6466e8c833fb52c2edb17832a8aa153b407a5c24d33b5", 0x5f}, {&(0x7f0000001640)="f260ea077e51761e9dfa7192da0cec4a1312434eee0b1b7b0fa53fe2f1c4bfe10da15bbd870b03ff89eceb772e3a4f3c530305c45d4669152802416013f9258deefbf8612c0143868d3999bc566360e119c6637f6cd177288e07d3516cf714fb20f28e747ed340005ad4dcea83d0338e81e165d54e3eb3030529a9a29abf19b0", 0x80}, {&(0x7f0000000380)="e7e82bc4b04d7564956950e90aaa36928787234c4507cb25db50328a42a7ec5fb243", 0x22}, {&(0x7f00000019c0)="1c254b0951bdd8dbd0ca970a19755d3c11bd915865423439c95fbc70f89c1ea6ddf7914eabfaf1f23d6441839af289f5a889fd3c149f0eb1bd20b66e38e34de06e0df80a14e708e7bf5d1845fe9886cbb4109bb58d414fc65d560a83b0b9b21d7c4fe7e98e294ddaa35418b6f5d155aa0d24c2f04a77ae8632d63c51c1da2f4aeea3d86919da3f26d52969492ec90daff80c50fbdd1e2e9208719dd00c74aab521e4beeccd01880049e02e1f4fc0c71ff9dfcfa95fc802291646613dac3bf3fece1e4c3e667c45526ce89a6b00c7221bbd7d4fb6c4369d3fe8b3ce865cd3f07ac975ecf4ca7834b04bd9033a699116316cdc281d0b7e", 0xf6}, {&(0x7f0000001780)="367e06f16894d525aafd011799fc81fb50692d020c5cb1263eeffb3befef0edc66912043272de51b31ef960b30cae089ed3db5623bc0e68662b71b198b0bf524fd83ad8078fb5c407870c680d3ef1802435f09bb2d110866ea36148f6e7f1d8cefea63a45408905eeefebc47fc31676bd515bdcd39e634783a08bf35da635be3b26985059177f059aa6ed3ac3072556676778da6204efe13ca89983c46ae57dd95ed0470ab9561fe6a9fa5b540c46f8a9d3222ddaab5d7c71d498606b5e3d15bc04c6eb063beb420a59bfa3c9217338c6edf145e51680da01114e5f41e47b1872441abe1a2ac2542c9b3bba7d068c9809ae5107c3b7b4b05", 0xf8}, {&(0x7f0000000580)}, {&(0x7f0000002e00)="fb3f23c07c4f776e1873627f827a6133c9a64aad9ca4ebda26b0319648152add4b6f066ce43ca84b3fa3eafed009dc4aac95e86a91aa3013a41456802ce90e358e3ed05753dd647d21fa8087450a15846d2226400a3bba11b8b2a3d852e047376f85d3ba8897c20163745dfe323581fcf39b602febbd7830f2142f218d3e296207b6aa8818c2f7e289ce3754b89584fc4a440e7719d27af50d59aa93797de2c3fadd89c2bc9471452a4e4654cc3f29a6609ab0e8972195f69fb3bb427b7680d7ce89fffb6e349a3c0e3d09518350657154c9f7def34ba7f50c5f1b968e38a0d39ace7ff7d5bce74fa422401fc5a314d4b6ea6b722219ef9bb7392ad29a7a04e9adc71920b0c48cd731d84778d1569c20b6acf9d6def99f5e57a79db05a25cf79eabf789f58aac8aeca7128df1d7aeb662e0c4a35b6d2e080b5587e2924a6334593da5ff61989b6800e81328412355aac059bb37a0d74c22269effb08878ecc3d7da3a02d3272d0903763b0a4f0ebdcc832c0ee01bd94f47427a264593921248fd95a2d807312ea5d4c2304c52cbe080aecf5f35fea5482dd69ec86536d44a1792147c8bcf892ced63686ca71134c6dfbc53d3c937deaa67aab14855ae33abe46335084148deb2926558db2778a78a8e743a39ebcc8a71bceb44945c9875db4c15407337de384c3974eb6ceee42beaaf63a10450c9ef50be5626eacd85c0c516bb14bd770e2cdae519921d9d088da3f74734bfa3bfd5b7a649f4f22ce7e863a6d7b77f8678642b7537ffd4298ecec3c0206589e8cfea912d64edc850dd33bc19ded534df517587e05c37f0b3ad1f50ffdc62ebf6f7255050285378c2bca296856eb295b30ca84e3db96cc6e7e83e8c296e4c8503dd11e4cf64068faf8ba1ac92738382cd23d65e0331812a03563166cd125c2c5be2ba3258f72a2a431ae3bf39649bc4c473d4ed1a3d8ea73cb5d82c90e9b4788d2f7b2a48789d95e1c515a84dd8099f8c42b3fec0aef0913b7906437b2e1937f70d1051c1c3b84af3fb5b3daaf9eed2bb77fbf8aa59dec9dfe5f0b59fe06627f4c505e7ad1f1f84a486c2482a5d3c3d302a1103a3534a9c2781885b2b20562346e9178c44e045563544608b20dfd72466870979789a1a8a1a51fe4f78e377355ebb32d37c3b39b93d0d08cc0d7d185507349e5f8b7f98ffc4bb1e810788759c56f0f07f3363fed51a5b5d5debdc4df4e7034fe2d37dbcdaf5e8267491f03e4ff3a2969e33b82337cc8a35262ac555d68a8e79acc176869481772a680f734836ee3a41de5958c963bc5db965bffab85b8df47e1233410a427b66609e7f831fc375abcff713b93d3f3fb592ac046b13c74bb45c742dbea397e4f082e23b69d6e9ab65920b414ac53634dd9b5f4110d0e14f382bc6368403f49dbfdbebdc6a5924c150b019df491233f0b4300857a46ce1e77df1e35b057bb695d94da2048e2105750ed478be649ba04a6b3d7cbe6028a76c15abb9f19dbb6ccedcceef0f5b09c2f0e108c664cd2e7722802d3a64b956af0397077c5857a8289d68f7b83fae81692ee6854cb5b26a56758580254c1c35fc9a73dbe598d5718bdd980f4495208be1b4cccaf62cc86fd9c2ee4bcd5c496fb4c867ce0bd6338c5cc69b5e0556804f4e96652fa701bf3ee761c5234436e4a8278863c2323a81498d10cbaeb93222d6bf42a354de3a96c9dcff2e0cf60d3228d2d02de9fdb0807015176e41bc0a50f027946d991be8344e431386ad1555cefca40d81b3954cc264d88c663458619d3d2cc3f96a84bd50be470f817f1540683f2d98964dda575df05ee9d8e0c0f21c2cfa0162983a5be8ab6d8bbb819b7a0e1dbd58390d9517af05d72940aea89ad7982fa48c776d7da9d8af682a1a79e8ee3dc53aece9b3103396fe6d1345bd2acae14b74097eb48b67ec4caf6fb122057bebb1933ffa3890004e91d80de0ab55a24f8cd5b1f010c5de2bb6d04e2320147c44e278be46438047527a2bc13dc4a0c37ece700b3b4a471fecb969cf675b726ee5468324c4ab26aaaf03a270462accbc810f2888e305a6296663d86e299a858017cdc29286284be771bfb525a29ee63b821c7566cc2da5d3c84caf5c947c7160377ab61e0a6a927ec8cfca4dfeac98adf5eaee5f500cfe0636112645dbf45329e8bb21420badd5c7a339bd702feea8503bb4c9689d5193849d20148c74f53c15d368ae5de6c5f90f80805e0e9dccf550e7c912ea344edfece53aa4b4afefb97bc8d757d042bde171ae766f4405e6e432030f25fb06b8fc326797a29d2b9d6197acd8c965fcc9b9f71e7225fd01b5a0367150c067b8a89d3bb088fd057aaf1b7e59aba2717bf1be814afa93af2d228b2e3f45c38174ab00aebe74fa490b928e0772825587779391ef388a22517796f9f3d8043d18718a6d90f1248922a5924702a92b72f46e7bdb17b5340be7a2cebb0171cc8a8d88b2e0bbb134ae00e2fed855f04a744372925132308ee7fd51fb0cc0becdefd5c51c19d1563a84ed92259140c58e5ea0919a9e478346ecd50f1e1739e93b5e762046449f949267ba662d20c1230bd2b3664dd213a9b49e56488f462c3d77c63779cefa47529416fb23f38bf204e54ad68f711144b571a0e90d118cf6a89cd0c265000eafb8adf7de59565f235faba563d56e06ec815160835e2db98e91be3b51a058a255649a3db7888bb3cdf3c999ce0cc0479302d9d9abbe1576a39dfe3829def99b9720a324ae190610b8e37a22bd3494ee97ad1b984006266d6f52e69bc43c02fb7e2be7e9d3838d02d5b57b342741018abc32d93279ddfb34969f7edd73152459f6de95722f07b73b0fe3fa8ac0c118fa4325ecf5dbc593c257147055bf8dc9a24deb9a5e4f48d469e20731f2b480ebb6c8d508badb186ee2124fee0731a637c3f4ab6ba5167f849e3ef7bbdde4ae6c3db65f59c80a495c68a2dda8729ed10c21aa50490132c2c9ef7da6f395d0920c3dc3071ce205a7bc9181dce3449ae37d874755ebb78cdd604b75a1c9deec603ac7a1d9662e17ccf1a68ad8190432c568f2941ca5edd5789a339cf7300c1227a95832e5b2a8cb748dec9b8706b3de1cecbd2cddb79e898b77913f8af5de8ad7c06b3a1d9ff72a950d3813b81965396620c7562f5fb8c3ed77ce0a381c5c888df60a19f041d4fb8923b3843675e2eccfee3d4b352feead18e9798e4241f04964d3b594f16234af5192e57a45b77c0f7bd1c7b8c82026017e43ab34e969f7dd431fa8dac81debd5e632c831f6344a643efe8cb7ed6e2b506d6f718b3dc2e265bd815f7938a74347d53a86100b823966a78f17fefafd5aab0921a268ed51ebf531324e52293836632dcf8a9e4b96d95afcbbdd93fd9c0a743b490d67003b83d63571b50a8e42c0b69af49a24b100400f22a4ca6c4431108444fdb2c996bacc6a80a77c9c48aafc2654cec67104cd7775e121e0aad70cbddccf007fe180c1ed335f2e21729e8e90ab9b186e39cc5bb8438ad66023e8057e4070e42097cf5d7d3aa76d1d58b79fd306e196f65fb8737e0cd1305b6eb43e096d874ce1a75dd043efbd178140151edbacc28f9d178c7a6bdf33006ad64816105da5624bd8e47864a0a45a7964d460602c27dbb2fe1b752e33d04e9dd4b2b1e16f52e9188dad3a6b9b75c9aabf812fd7f95ba206010a1b46079a17783e1ebac65b0f103a7a0a96530a7fa1d24ddbf0d9204ecb78c6d9431169bed37039ec77877f3787b181d04e4b6a46b374b29ca87722d31d5b4d55076d3a1df97660663359404b292391e08ef4ee7b606b19b60c4b69e0ad9090721959ad76b241dce559ddcee0444c6d649aae19822ee4f7c7b902659960825cc4c56cc0b0d675876e560b7e0bd68e1003ab38187e5288499a062d4b42277f08b0c39032939a0129fe95755ba11523fd9fc49595a6396331216d097deb63d868be01ae60cc7a445ef7a398671453cf180d6af533afae4a78763f40a56aed7603e259b1dad16ba0a8b48d244d93f5e5fb1a780dbc29ea589e2697bd7a93066d5ef380272b79b304efef7fdce0d2d53048430a64aadb4fac7990536a17ede49a80317695ceec375a9a6e01f24763e9f06220d110648967be3847d84d6db20fc9a7c62ab28a58c36b6210c808d49254a89900477d2abb7d72bf07b97b3e7ac1393f1429f59c7d935f661710b7448b83068de25e0e9adfb5146b152bbd0b9e6ae298044df59ad56fc2d283c23d4dae96d7928848ab923275d103da2f1ca662960b3f2043aa6acd38cecc8aba9a6238f4f115c38d3e10ea003649d4fabbda2a679628bb174a86c796e43a3def39c88e6b55693a9b44fd8efdece2ed884f337f829d9b73b5ae801a1fd2228de47fb1998b8535516f845937eec46838979415d49a55ae6e8874defc75490cdc2ff534b784bdcb2f377fd442faf329febb1c9f706fecbcb2bed9a7bb4625f48fa0b11f8a39cd7f0896173a29559c3efade2e2a2316e81bd75f04e0a3273c70fa2947a056da8d66d221b628540372fc81f8b154869855a2a4464f173233ab8169de148a5ea54b43c56724653e4fd12b56e030f6100459efc0f3b7cd7e5ffef0e29caae4835ffcc2d65fa83c4e4a126f8afaf5006b09d42ca9f582c98bb8d64737336f57cf9627fbce152215cb385284d8d6248b1fc995632f2d2ab4d32bed2ba3b2b99c1e66d4fac35930cca5ac8eabf34044c32910b81a2e975bf5c404754b48e8f65b19fda29136bbde1cd292597c38ab2fc1e918943608e19227f34918c2fdadf3353b0887e563042e2b186fa67a69d5add0a89ffd7bcccd984c5e9759fadd971230f34f87fa27b7e27955f5ce9c23c0561bfcf03dafc8ba70e8a5da0e50bc1f1bc2200911f283d51b2ecafbc56318a7a3eab6c42970f6f95d3fdb58e3527c5ee98439b6d0a8ad18f11a56eead4bd4c3f6027ee9357cba6b36109c98da3f2d5937a4e000667ab0d15841253c9836d93ffa5cf44cf7b2ed98d9f0ffb9bc332783df87550392e47417203e36fe67edf0b261ea2908c54c15b3a19fa91a9e6995901aa01e164787b13db80a79e796f24750be5807010ed948b8f4062c688f127e209de369f0a34062da399e7ba5084f7a559f68e1253cc2d4e116ab55a16ee426d31d58b6da2e57b347027c383992edbda9781d9cc131430cad8ae5b1fca9e459a39e2c4bfdf9280711cb273a3b7a37832cda81b380dafbbfc637fc8928284c80a381ef9772359f0f5d13a8d77a3236e85034f06c75b7708b08b40794140891830dec5b6f648f48b866dda03ade82e21d88fe69f42673935786b0ac608cd32cfc85d3703c3c583e12c1a55f6638c7c51d5b835acbc82c4dd9b5c20b6861ad826020d0412771b3d9e4a3b13e0472b64e2bd8e8662fbaa6472ab32e5261e28fd1cc153cb09f744c9ab34a28efef8a45f549c6962ab46806088b78fb265a68e8798ee24541a7f3c3e528e0f532504ec80a1d6330f8fd3e2d4d35e593c54741ec3f72d9bd6eff19110ae80706e1d3b82647ba5b5e2d225c4d4d74edfbd5a8155536a07745968461cbf4ac3d7a309240989d349e66c73cf40827cf63178f3bbf76b3207977e48f562201a79de31a9ee29450f7b0656b083bb84e70a17516f1e03d2fe4db956ff8f46b2a84b923cc774a8e726730ee84fb5cd05c0650a32c3784c950892fb9e1a97c109b5b49f006a22f28f6ed4291d07069dc20f883ba4b39649983e4392da363ddcab012e4e49d072dd4c62a040b871550f2aad341e39c96e7d5229d056d121d00635", 0x1000}], 0x100000000000015b, &(0x7f0000001900)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x86}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x60}, 0x40000) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000580)={[0x2]}, 0x8, 0x80000) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000140)=0xfffffffffffffffe) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) setsockopt(r0, 0x80000000, 0x3, &(0x7f0000000640)="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", 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:36:50 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) openat(r3, &(0x7f0000000000)='./file1\x00', 0x200900, 0x10) 09:36:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1000003) [ 2675.903735] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:36:50 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:36:50 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:36:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x9ffd) 09:36:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r2 = openat2(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x101000, 0x28, 0x1}, 0x18) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000140)={0x0, 0x9, 0x8, 0x7ff, 0x3, 0x8001}) openat(r1, &(0x7f0000000180)='./file0\x00', 0x188140, 0x8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) 09:36:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:36:50 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2675.939352] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2675.943912] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2675.953735] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. 09:36:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=[0x0], 0x1000) ftruncate(r0, 0x4) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x400800, 0x20) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x100}) r1 = open_tree(r0, &(0x7f0000000380)='./file0\x00', 0x8101) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r5 = fcntl$dupfd(r4, 0x0, r3) fcntl$dupfd(r1, 0x0, r4) setresuid(0x0, r2, 0xee00) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1200008715000000000000ffff9f98a800"], 0x14}, 0x1, 0x0, 0x0, 0x801}, 0x0) sendmsg$nl_generic(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="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"], 0x2a4}, 0x1, 0x0, 0x0, 0x400c010}, 0x2000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)=@v1={0x1000000, [{0x80, 0xe73}]}, 0xc, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:36:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xaffd) 09:36:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:36:50 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x9, 0x2010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r1, 0x0, &(0x7f0000000600)=@IORING_OP_SENDMSG={0x9, 0x5, 0x0, r0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=@l2tp={0x2, 0x0, @broadcast, 0x2}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000000)="364ade1ce0bf5204b28affe50dc2fe8e2c9785e5d87bb39a27e786", 0x1b}, {&(0x7f00000001c0)="40a7caaac4057c546c9c199d2ee5c29fc9a17d5b20ee80c04f1d283ee1c9deb7b939195f3449560b7922f61bc0c7086d56b75850f4c65e8c843e19c4e952507816a0c089", 0x44}, {&(0x7f0000000100)="96cc3b899b02725597f7aa6612551492842789fb3406d9de2a4c6d59", 0x1c}, {&(0x7f0000000240)="f70d24cff438a3496d0bcce000c17cbd28d80f9c6dac44fa6fe82955404db8e978e25db5b7ac02ae71ac4b4c14939d30cbfc5ee1960538a5aff5635a0e90a55c70dac59e7c2b", 0x46}, {&(0x7f00000002c0)="81cfc5cd7cee5cb0bcdd27c7262c4a0ecf163f859e3f36179a10e204cb679ce8985f87143067dcfaeb07c354d215d879e94936582066ef7fc16654e52ed93cb03a9162936f9180be8bc1354c0f4fc6fc5f306b48d9e13a302403e86cf9f042b29ef4bccc59d43d1fb13d96df0b7d495395571cf3b34c15", 0x77}, {&(0x7f0000000340)="ad6abdeb1e0100a8", 0x8}, {&(0x7f0000000380)="c0734fcde93d2f0d43c42ec88e8eba3418e371b5857cd92e4e5490bf4e6c699ac473c66c09c6d6278286153cdfa898ee6710b820cb5d544137108d805603d3301c221799a7b7023f0f90353447402096fe9f0bc77826c7f1cd51ad178ed9216e09b609ec887ccee407be8f3999a53fb8bd24eebc85e4c86deee0c12851b1cccbe6ef0ea0c4cba64890097a2b24239f125af787dc436b07993029c813ae3b453acd6a05e728e622f9f526e948c2cf", 0xae}, {&(0x7f0000000440)="6ee5710e24dd38ea07e649985d95255ddb7cb3282a3323fe547702164d728dcdd7f55f35e67c", 0x26}], 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="80000000000000000401000009000000546e3c5b129dd34dd5c54988b0a1517c7f7a0f036f009bef15572b74bc6fc20e4ca3b08bda1a81b61bde0a9fcba133a2d19bc82ff351872d56bb263f1af05f2450ad645f1e03fc32082363040d4525dfdd5d03b9dce7d0073df3891687b2c746b970630700"/128], 0x80}, 0x0, 0x400c0, 0x1}, 0xfff) 09:36:50 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/mcfilter\x00') ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x466b587e284256d2}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xd4, 0x4, 0x8, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x1b}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_RETRANS={0x8, 0xa, 0x1, 0x0, 0xce}, @CTA_TIMEOUT_TCP_ESTABLISHED={0x8, 0x3, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_TCP_RETRANS={0x8, 0xa, 0x1, 0x0, 0x48}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xff}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1f}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xfffffff9}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1ff}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x61b}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x466b}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6007}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x800}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3f}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xfffffffd}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40020800}, 0xc000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) socket$packet(0x11, 0x2, 0x300) ftruncate(r2, 0x1000003) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x2000}, 0x4) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0xffffffff}, {0x6, 0x788}]}, 0x14, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2676.159220] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:36:50 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2676.296580] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:37:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xbffd) 09:37:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x2000ffaf) 09:37:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendfile(r0, r0, &(0x7f0000000100)=0x8, 0x5) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r5 = fcntl$dupfd(r4, 0x0, r3) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="a896c958d9c1703500000000000000000a0a0000"], 0x14}}, 0x0) r6 = openat(r5, &(0x7f00000000c0)='./file0\x00', 0x4662, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) openat$full(0xffffffffffffff9c, 0x0, 0xc0100, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x40086602, &(0x7f0000000000)={0x200000, 0xfffffffd, 0x0, 0x2, 0x2}) fsetxattr$security_capability(r6, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x7ffffff, 0x3}]}, 0x14, 0x0) close(r5) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x5, 0x3ff, 0x70}, 0x0) stat(&(0x7f0000000580)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v3={0x3000000, [{0x8f65a90e, 0x7f}, {0x8, 0xfffffc00}], r2}, 0x18, 0x0) pipe2(&(0x7f0000000140), 0x80800) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:04 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:37:04 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:37:04 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000140)=0x7, 0x4) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000001c0)="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") [ 2690.387050] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2690.402183] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2690.404359] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:37:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000100)={0x4, 0x600, 0x9, 0x8520, 0x9}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) clone3(&(0x7f0000000480)={0x80000000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240), {0x10}, &(0x7f00000002c0)=""/174, 0xae, &(0x7f0000000380)=""/120, &(0x7f0000000400)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) recvmmsg$unix(r1, &(0x7f0000005540)=[{{&(0x7f0000000500)=@abs, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000580)=""/242, 0xf2}, {&(0x7f0000000680)=""/176, 0xb0}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/214, 0xd6}, {&(0x7f0000000900)=""/17, 0x11}, {&(0x7f0000000940)=""/62, 0x3e}, {&(0x7f0000000980)=""/100, 0x64}, {&(0x7f0000000a00)=""/193, 0xc1}, {&(0x7f0000000b00)=""/208, 0xd0}], 0x9, &(0x7f0000000cc0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}, {{&(0x7f0000000d80)=@abs, 0x6e, &(0x7f0000002140)=[{&(0x7f0000000e00)=""/149, 0x95}, {&(0x7f0000000ec0)=""/249, 0xf9}, {&(0x7f0000000fc0)=""/183, 0xb7}, {&(0x7f0000001080)=""/64, 0x40}, {&(0x7f00000010c0)=""/79, 0x4f}, {&(0x7f0000001140)=""/4096, 0x1000}], 0x6, &(0x7f00000021c0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000002240), 0x6e, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/83, 0x53}, {&(0x7f0000002340)=""/64, 0x40}, {&(0x7f0000002380)=""/152, 0x98}, {&(0x7f0000002440)=""/28, 0x1c}], 0x4, &(0x7f00000024c0)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000002540), 0x6e, &(0x7f0000003880)=[{&(0x7f00000025c0)=""/249, 0xf9}, {&(0x7f00000026c0)=""/233, 0xe9}, {&(0x7f00000027c0)=""/50, 0x32}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000003800)=""/109, 0x6d}], 0x5}}, {{&(0x7f0000003900), 0x6e, &(0x7f0000004a80)=[{&(0x7f0000003980)=""/4096, 0x1000}, {&(0x7f0000004980)=""/228, 0xe4}], 0x2, &(0x7f0000004ac0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}}, {{&(0x7f0000004b80), 0x6e, &(0x7f0000004cc0)=[{&(0x7f0000004c00)=""/185, 0xb9}], 0x1, &(0x7f0000004d00)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}, {{&(0x7f0000004dc0)=@abs, 0x6e, &(0x7f0000004f40)=[{&(0x7f0000004e40)=""/151, 0x97}, {&(0x7f0000004f00)=""/39, 0x27}], 0x2, &(0x7f0000004f80)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}, {{&(0x7f0000005040)=@abs, 0x6e, &(0x7f0000005100)=[{&(0x7f00000050c0)=""/13, 0xd}], 0x1, &(0x7f0000005140)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f00000051c0)=@abs, 0x6e, &(0x7f0000005480)=[{&(0x7f0000005240)=""/172, 0xac}, {&(0x7f0000005300)=""/195, 0xc3}, {&(0x7f0000005400)=""/80, 0x50}], 0x3, &(0x7f00000054c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}], 0x9, 0x40, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2000007, &(0x7f0000005780)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_client}, {@debug={'debug', 0x3d, 0xffffffff}}, {@dfltgid={'dfltgid', 0x3d, r4}}, {@debug={'debug', 0x3d, 0x1}}, {@fscache}, {@access_client}, {@uname={'uname', 0x3d, '\x00'}}, {@version_u}], [{@audit}]}}) dup(r2) 09:37:04 executing program 1: ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x20, 0x5, 0x4, 0x5}, {0x9, 0x1, 0x1f, 0xb0000000}, {0x9, 0x6, 0xd6, 0x3}]}) clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x325) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) 09:37:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000002c0)='\x88\x00\v\xe3\x17\x98\xd9\xb2\xc7\xb1\xf1\x1eWo\xe2\n\xc6\xf7\x95N.C\x1b\x90_o+\x04\x8a.\x90\xa7\x92\xac\x8eV8\x8f\x82~\xb4\x8f\x96I\xe7\xed\xd0\x115\xe6\xd4+\xe70(\xc0g\xc1\x05\xa3RQ\xc4G#\x11\xf1g\xb10\xa5R\x19!\x10\x1e\x97~\xb7\xb0\x04\x8d\xd9\xbeP+\xae\x8a\x17\x19\'\x14%\b:e&\xaf\xeel\x7f\xf8aw\'>e\xd0^\xed\xc2i,\x95b\xc5\a\xbcwD\xaaP\x05\x84+\xed>e\x83\xff@\xf0\xd7N=\x8e\x1c\xf6\xb5\xcc\xe1JK\xaf\xf0\x9f\xd2@\xd2\x8c\b\xa3\xe5L\xf1\x02N?\x82\x9b(\x99\xab\xdd>N\xcd\x03\x99\xcf\xf1\xba\xe0\x85\xb5\xad\f\xe0@\xacs0\xe3\xf6\v\xeaK\xb8@\xc1F\n\x85\xd6}', &(0x7f0000000640)='\xdd$-\x00\xf8\xa5\xa3\r]A\xd1\xc6}\xb6\xa6\x0f\xb4\xc0\xc2\xbd`\xee\x19\x7f\xea|\xb1\xe1]4\x0fA\x15-X\xbd^\t1bw\t\xfa\x8dS\x7f{Z2\xa2n\xb2\x88~D\xf6\xe3A\x98Mfum\xb8c\xd7(C\x0e\x82\\\x1a\x05\xb1%a\x9e\xc4t\xfa\xd6'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2690.531296] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:37:04 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:37:04 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2690.640109] 9pnet: Insufficient options for proto=fd [ 2690.681581] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2690.712464] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2690.765924] 9pnet: Insufficient options for proto=fd 09:37:18 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:37:18 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$CDROM_SET_OPTIONS(r3, 0x5320, 0x8) 09:37:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfffffdef) 09:37:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:37:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000004c0)=[0xfffffffffffffffd, &(0x7f0000000400)=']$-\x00', &(0x7f0000000380)=']$-\x00', &(0x7f00000003c0)='\xeb,)*\x00', &(0x7f0000000440)='#^$-!:^)[#\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000340), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="140019000a000000000000000000000000000000f3af6d6cd0ef3e7f6f3c44307433fdeb2122ae6b4b633afa690e241bb43908d0f420b5830161951627dbbf9fad25caeda0a7639ba9d78f800a149698429d1ef8a3b7147924d3017d76d457827d27ebd7fb090d5dbad9ce2fceb505f020dd4fb6"], 0x14}}, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x7, 0x92, 0x29, 0x5, 0x0, 0x7f, 0x60004, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140)}, 0x12000, 0x7, 0x3, 0x9, 0x8, 0x7, 0x75, 0x0, 0x6}, 0x0, 0x6, r2, 0xa) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:18 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2704.419884] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2704.432854] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:37:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x1277, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f00000000c0)=@v2={0x2000000, [{0xffffffff}, {0x8000000, 0x3}]}, 0x14, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1}}, 0x290) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) mknodat$loop(r1, &(0x7f0000000100)='./file1\x00', 0xc000, 0x1) 09:37:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xcffd) [ 2704.434849] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2704.453113] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:37:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xdffd) 09:37:18 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) pidfd_getfd(r0, r0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:37:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000140)) 09:37:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2704.574525] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:37:18 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.memory_spread_page\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:37:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f00000000c0)={0x0, 0xf011}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = inotify_init1(0x800) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r2, 0x40047211, &(0x7f0000000100)=0x4) 09:37:18 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2704.696055] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:37:18 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2704.786264] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2704.804584] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:37:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x400ff40bffd) 09:37:32 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:37:32 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2717.977608] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:37:32 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000140)={0xffffffffffffffff, 0x707, 0x0, 0x14}) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x9c) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r1, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r2, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:32 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2718.012360] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:37:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xeffd) 09:37:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xc1}]}]}]}, 0x34}}, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r6 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x46e0, 0xc1) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r6, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x14}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x74, 0x0, 0x82a, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x44004}, 0x4000010) ioctl$FS_IOC_FSSETXATTR(r6, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r6, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2718.024217] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. 09:37:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmmsg$inet6(r2, &(0x7f0000002540)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x101, @local, 0x3ff}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000080)="3c7a20c8c972fa19d7bc2a21c80f3b7acfedc820d4a3d08f8d391294955bf621598b730da90d7a7e3530b3c92679eb85e2463099216c86d78ae1d9f47465a40bae6811b92dc5d1c5c332e37f3e3cdf2d6debae6d0ac5d2c9879b8c8dd13517ee5e6b1c8e47761aed0b43d7db975f4e565e7afdc4e4ea966fcbd027afcce1d4e36f85a0a4e1471743", 0x88}, {&(0x7f00000001c0)="fa8de5b0f1f9e6d2768ef1beee4079e0b0d8e2a3ebf2352645bf345874ef4f87a96a49bc0a0cb4a6fd707e95df2ff3a62515a8d1116b7fee42395d54f41f0c55433bcb23479b6a624bd90af168b0f920c171dac6b55afbd77c6224e435aae19e29d454d6c00a11fa056a34d149e2ed1e651af5a9afba9d2e45a4be44917c325fbf10aa1eb5364aeb950f40a8d7822641e72a890864eaf7d62d2cbee7f33d9a192d0627ea7cd13361df5cf16217b1b0582fd1a640729d846f9545a1f4c4a726d4495c595cfc9c4ae32f23bfd495abe5c7", 0xd0}], 0x2, &(0x7f0000000300)=[@rthdr_2292={{0xb8, 0x29, 0x39, {0x16, 0x14, 0x1, 0x6, 0x0, [@mcast1, @mcast2, @remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, @mcast1, @ipv4={'\x00', '\xff\xff', @multicast2}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, @local]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2}}, @hopopts={{0x50, 0x29, 0x36, {0x5c, 0x6, '\x00', [@ra={0x5, 0x2, 0x3}, @pad1, @hao={0xc9, 0x10, @mcast1}, @jumbo={0xc2, 0x4, 0xf8}, @jumbo={0xc2, 0x4, 0xff}, @hao={0xc9, 0x10, @private1}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@remote}}}], 0x148}}, {{&(0x7f0000000480)={0xa, 0x4e23, 0x3ff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c, &(0x7f0000000940)=[{&(0x7f0000000500)="47ca0f7c332eb677461fffc85efdf0b0f2f96fbb69b31c8f1b6138875000c54af7fa3acf9e1ad15ec7017640a9e9546c1f3a8dfc4c91adbf188cb49fe1b64f7d41c175ff86f46597201d824bf06c69ef1b0d91248d9f2f34d60a956ad651158adee353b96866cf07995a8390e371cb62d9a55a3eff56475c41a71de29976bc12aca11ed8ab51d5078f3f6303733fb77ad9d2d0e52f9b81dbfcd23fb19e9a747b0604d08e0aba1ae791b4151586c85e88a5886ba8248e6f9c3d550c6447dd660d6740dcdbe7816dc0", 0xc8}, {&(0x7f0000000600)="f17d312aaeb4993e648f3c861c8ff3fb20c4f7d4b024ba3bdb1ad2e9a9ae407dd20628ea1ac0fca59b976deaa2b823b1d75ec7dce7d921e37b7beaad6facc99a1d0ce7208c573888fdbcad0f665028c2eabb9424366f2752e3abb83bc5f9641e429405a7c3bb768f19ff91c1f7736fd388ac29d796a57d8e821c58e7f1fae4affb3a4c189a564bb3ddb07f142609fae438a5eb44e6513ff1c7ce6e3d59092be15675e8", 0xa3}, {&(0x7f0000002680)="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", 0xff}, {&(0x7f00000007c0)="4508c34335959c37e0c1fb5a7bebfe59bb41b332563a3344152ee353b86db34c3698cfad1c9fedbf4b9494367d68f1cd93208ba7886761a31397ecd0ebc06ab3dab4643734575932f138bc486352fe8bb9778e920e995cdb372bb1", 0x5b}, {&(0x7f0000000840)="c1aba43cc7d8fa7f6c119a28857c", 0xe}, {&(0x7f0000000880)="a35f16784a7fbda46c3750ffc0c35cd4d7db4cc2313597510e2c7fef693b53b2a0cfa5d1d6a696ae5bd0d5c2987f5d1fcedae7546ac85f7d518f6b39bbe0a0dc732f1775030392c06997cfca2cb3717d19a5d6615711c2fc458d3655d0677e68fbbf46a35345778d9422923850b3e0217e5d734712f31b05a2b67882d999c8943625863fbddda0d7f9d246591fa70c002494754204986ade6c98ed6385941acc488407f37ed7", 0xa6}], 0x6, &(0x7f00000009c0)=[@flowinfo={{0x14, 0x29, 0xb, 0xdc8f}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xb60}}, @tclass={{0x14, 0x29, 0x43, 0x9}}], 0x48}}, {{&(0x7f0000000a40)={0xa, 0x4e24, 0x4, @mcast2}, 0x1c, &(0x7f0000001a80)=[{&(0x7f0000000a80)="749c5000e774aebfec0923783eab72e3008bb7a0ac07b79acd037b5ab550efedc94d25d443e339a86f12599a9073a984143fae3b9e139025e8912ee110c65981465a93561905f02314b09b4b7bf8a6e7431233f00194c48b6255a8a3ea875337be025391a8d705cf6f077500534a980c9b89064358d50ae0207694c428f190ac4250f9fb0e66d963cb412e471caa4fc7d628a60b7bcd1bf751c5869a4393c9b1577b88f005f4bc41734808a02205344dcbb318d0a29e47e2ac6b70dff8cae817785edc8a9733946d54db52295ed65ed8175bd100e717ca1356955c48c1236994149b20e2d3a66dcaa5b43219b8d0d5fcd125d5637b3a8e1a1ee46cf7a59871e0977641062f3511a9f466170800661eb7ad8002475b2c7c7102229fbfaf1f6d6e3d7c76b5f968486acc243eae9fcb7fd34181bbd8207a7c08558cb24759dc073dbb92a89f0932341bcc71f98f84235d4652311afd0af4ba545b4907f57e6d31622fa665327bba0b531e70ee047f22b205070d10143d4c14cda86986e111ed731d882221ade7b8eb832ba03439315f42906c05adced3eab39c9400d87f5549293e31117b59ac4a73edcdf85b35f614698b4ad7d9a7bee0db10ab3ca885f1b1706d08ac53f543d1b6bde5b0fe3048909ab2432cd059a43c0af5c4669e4e6eeb0db4a97fd939fca65e6e669c0ce9dde3b6a2e5c87b4260301ab5dd99d038bc6f4958d56bed6999a1c0ced8fb8543f077dfca003f82412bc3aa54ae8cd0f6759954813c429bcf8fe03470f0da7b6bcb0e521216513327aeb741cdb104233c9d5970c7b626fa2100dc839c842c80e7da96b61eee4bf6028bbb7550e1c012fa4773ead2e2a2320171b8b3a75e7ec146a1f15032ede74612393254d95699cba3546e0f7c532ce154f876f584e002031755ba72875d375ec0c077ddd314598144ff8be188eaff5cc6d3c40dc84c304c5478fc306d5165017cee71d6d642759b46bc494b278e9d68817fc4af4b18203cfbd08abd0cf70fefacca4eb2d7347a742622d93cdc033d28dec07da0d537f3adbaf9bdb3e4dd4f8a5507189eb033ed36507da6950e1e6db981361d718dfee539f23df0bc150bee3b9008e1836c3949da7d0ed98e5829ddca1a75bf31ff2f00b52ecdd4726bdd0d4282e65af38b054c223d8f34a367ad363406cd1c82e682e41edb0c735541ec8b89765b8ff6a281f02326804c774e95305126379c6469b7f9c81361652a9752e5ea8d2eee2ab5c9fd3e71650e5f8eae639d407a829c21fd95486a6ed34150fe0e0501ce747f4a1092495df35df82e1a05d767f2f593a9440de806685dd134ba05fd67ba8e1969115425cbc2aa5f6013b7987d37fac4f447317a1a686f4f53349eb2a5ce949257b59e024ee943a7462f19bcd764b5d1dd7768b3a6866469a9e2b00bfcc8731934d61073030423fce5f558a937a07a056ca88f222c64e632dfe5f7157861122e1cc9a66b2ba4ae5ec5c25ee37f61be9e691d387a230da98cd284f9376e567fb5f665cd4f241ada891bebb7463e2944c859271236ff2146d7882f29799536e7d2607f521cdb4a56cb2bacdaf422181b5dcf9e0634149d5f16788e17727deae2f112f587ef3eacb5e767daeeb4796e635e1b8f4569097fb82176e0e18b4bf8bc4f4e2620d1e6c4de9bf777f92f05de52110477917a24f4aa7ce7791108622267467469570830795230b3d6ec066e1f6d3577e7d29ac7bc13dc4c475acad1b08cd31b8e12d4ce8878eba27f15f3aa1cc3187359b9b557095ccb047d8dd97d4e4188e537f9adb33167ed53a93f77dfc0d63b66642264ebff34904d4bf7d597a8765148e243d5df76af0ec07c4e78943c115e473d06a23bb562ba55d4b20aadcd1496d2e3915f9cfc4a869010add8f7ecf655ece9128849e1cdbe666b760c4e57c7f4fb475e62b4a6b654f5f6e8aab0b3a775d046b9455acb076cd719e86afc039c889719798343ed2cb840555831e73c1be12013abb6bd121e21c4751c719ad461ee6468b282f93e221fcfad14e858677aa3d23245fcde5a1920878200708b95d5f492f59ab7fb706bf81117cb3740ff87d0fd6e326b6a95a4ea8398c17a355d4a23fe75254300d61ca18bb0e49a45544daed0b0d77d42a2cac9eab18417c11f9c0e2906a317a9b5018ae50a55f4cc72e1ebcdf31f001611029ba758a6a6316dda3f4dba8aed27965e95a305e3750c916c6a987a5c5d3e4ec603425e2ff44728cf6913e53f548c7f5ca8ea6f90896f629ef10e3b9737e50165f369411ba9a16a062b2bfc5c158c6cddb3b4bf14adadc85c349d8b698bc69ad8953aed0b610cc3e1c43f77b1e4e90829cc2e35fc67ccbba205a5d0939c91ed7afe3d3a8cc78867f11246ee63cfd0979c3a0c7cbb5b9adf9cbb15769fb1a43f15aa4ef826a91e4039db23244f2046352644cc62772388a6f2a492992aae555a87e4862989482122f09ac6845e70171f7c0cc4714d3ae898bb65b343df2fc3b8f792826d3b309201a49bd5f182bd42213ec240e3e18af51331a185bb80c70b5331e903f613b71733b8565525fc50796941b672945f15c69fa25227205551aa3a72abddfdcfb525996487f9ab4e2be6b73a68825852da100a4142c2cd9b975de84a612677490ed7b1eb842907e94a694deeb99da8b8fb6a78a66c904e614815c1fd2bfeac94ac552319a516e061480176a898128865a09d1e212802461aed994bc37fa1e040aa34e05274e9372f3098db740b0eea1283b37fbcddfb5977acb19e5602a583890ab262d4980273d853575a940ba037a3d65cc6b60a21dc69a9ec4ea1fd5eb4cc7327252f8abd0b1d6e9c8113c739df5b71843d0311ae723a1b8336414181e1e2e80f49871fcd65c6d86de5d7c63f965594970da476ce1aed60175b41c54541536c1fcb08c4971f727b37774c4201ce2e54b79e04b6c4889066e51e53c44f330f957210c3a1c74d635627c6dcfe5cc198140973473538d02891ceb1802419076f13f9ad186a4866e4454d5f73306c7b6c1580b89db9784807ff5c6be99612434fea6944b7f3261a3c88de7357a131e121a13dc18eb21f723ea097c779ebf7417cadc86d87350e429aa66cf6f3adef3269b00dd3d260b0806f1531fecfdd4c2a93b4eeb9aae8da586f03198e510ac2ba3036d20f9671236cfe9fee2ff0cff8ac99b09a3e8bf681d3c053b1151bcf325b1c982fca2ad55a51a8ae5c16805001c5a6e3d8764f4a0011410bb31f704ebd3d3d7dc7ab059d966c176a18838f26bf664074d5d1e9c89b1e3b34953da00e28bc65dc13126f9b5dc1cdc8d6be5bd26c8a174f76a839cb3a23f9a886622a18369c6ef72e2e7576e4a77c270e1f585e6b98f22b16ae0e1c27ba8d6ab20c73c108fb9165272b4e9d25c92df0987e4877267f338449390ff3de749981689e225c2b7159168a0c96df137c6ce6c3511f349f0096473aa249875d6e9d2457d130fc43491b8db70aaf4a02aadaf88fb7571a2438404161f958fb6899cbd86220b76d860525fd2c95253b373ba084c517ba4fb756668659ecb5ad5284b4001697c803575e4c36cebb678d3c9cc15a9e7495bcb073065179813e130c8981418ad0218f3a1448596395544ba477bef3a9092216d14747f0df9c4407116fbf6ec4ad8e305e623d9d3a8bdb0ba404c72783363affc3f4308d01429c2da67a30694ae98594b2c7fc9b8c7abae73d753e7cdfc7a4abfa19857e41b54e43dbaa80e90ce6e597f5c12c8938bb24dd37151aa5c6f4d2b8035b67b03030efe6bd98456467e4c14a4654d3ea234eefd47b6fdb7ea0bc6372903a07cc264dad5e2c77d294ad9f4f7bf63815a0ba82d8815786ff6bd6d8f64a03b35d153bd074f8b0e7ef275702e7c495914dc1fafeb2d144709927444cb6c9b0d6f08f42e4884c5574c47ff81cb9eb31d9f8a448e79fd51f90254cc88f82bf45d40b14a355f075d0d6422d50922284ef192313244be2ef947c9fb23f5aae6eb9cec837130e7e2ea3137bd782fa14e4d0017d1a00760e68730f0eae9eb57c87dcf712d7dcc6815dde6558793d9e066d5adf8d60572c17f67e4f298d80ca39875a58abd512dcc5baf87f80f19c501562e938964c294652e4aff215986d9b0da4fe3635025b2283bffb724ab0e26702fa7568377bc3a0cb4ca78b611b22c3b72dd55da44a935c192af7741861e1cbd4990fff3135fa9cc49205a89ee1b305febb13e8632b4ec99e003be4f1b278499afe45941984408a6d9ac1ddd787a5a07a0e44c81597fa09f19145ddf201c567a8e13b0aec7a9bd8c39cc8c25a87d0175158ecc7213347916ffc43bdb57c1df98bc6086062c21f53a0f320aacfd2e5a8ac46bd2f5a850c7d474a885f5501d2f7c73473dfcbf5cc3849b56a449740ef3c49cb3b3687d607b52360ed2810244567b9d4e5282ee1924354bef9a0bff6eed35bb6e1603006e1963f2480ff90b35da259749ba3b20e6a66276931b77329fbbf66e6a9302875e96e4e63536f61da45fbcc6c073bd3708d372d27c4c399cde71d67c5eea5f539bd5fce72c6d8f5ac05a85869f4d1f931c54d43579f35f1f7288577cfb2947d73ea48df9f3c8592abc7999df37d40729ce672a7d615568ab8a74a029d59ad454ab42f702b3306423f6c66eac06217b338e5e9dd6d01215c92be28d9391c42d613c84837ef149b560726209247900167dbb52013c68343298b5513438e7965769d93944b50da0fd126d5cc6d42d70af05483bf4e8bba2187994e89c1780a636e0eda55859f292ec3905da8287aa533dbd0bea68b43f01274d9b4c726fea8f03dd23783b924953ccd108910574ad005745552c385d4a11fb2cf0e0b10134264dac51ce995cb7cac8ef52410a436e8264a28ecf7d6c273611d008fc183a8641a12b0370f940b8c1c3cd76bed8bc1a57c064c65d5564dc1f06575763f30b2c29fa60b0d8a083cd720278e473de8600748e1a7ba3d2c8f92521eff46d53d9b29b242cdbe6932a24860066d20a9447806912808ea807c18b6952265022494bf1d07624694ff13d4e219823d5d92c2e8384e78d1af8cda3c98b37c090d25dba62ff32db5a554204fab74f5a1d4f012892392eab727012e0d2eb29777c74fdab10beda1eb5e75519468ac234d01f76bfc82f7dd09e79df14e6184b694a7ae001442c66622612da2ce01a58f92d23f8e2e5f0bb35c25d777d9ce640eb2b93656147a2b8a81d2990e0e33f62185c6d54084f20e5aa6fe669fff0f14ed7e316ddcdf6d70fd51de0f58c3ea84866267499668d192fba5f38bce8eab4c132aaac7a46d22d583e7e3a5fad74d51a4c318d0b3cc5574ae117235f439f34a4a234dad2491902fbeca1508a180fff42c64fb134145d6fd23d004eb91f666e22dee8b876f331efbcbe667b9f243f0ab41270e5a8e889116382894d756b30ad310aac3d562747db5c162198f2b17c22b5e44a2ab1858e6a28f13284c2a36a6352c9cecd78d6c3668dd9fe6972c621370f103ddb10f3dc9be2587d43be352b5c43fe176da30873f590aa6511e8d06e9b88cddb43af69116aaa21c4275f325122a30e4a615ce0794d5a846f0712751e8a08be47f26792e1f6b7f0e402125c830bb8f700f874e4be7601c34fc8306c82ed3a44b265ae881134840bbf76a5349d55f5d3a2a8e473e590f653328adb063cb795c9c3a02117472962ad5ab68799bf6ff21b2cf28e4f6312f39cbfb070070e6823f6e33f2e40cb8da58aac2ebcb15e21cf5bc267ebca65fe9ad5bdf99f71e13a2b999db164814b0", 0x1000}], 0x1, &(0x7f0000001ac0)=[@tclass={{0x14, 0x29, 0x43, 0x8}}], 0x18}}, {{&(0x7f0000001b00)={0xa, 0x4e24, 0x4, @empty, 0xfffffffb}, 0x1c, &(0x7f0000002000)=[{&(0x7f0000001b40)="7ca0461fbe69e12aa41ae046420b28704e7d5bef7296aca24c46304f93fd5f70c71f63afe2f835d6f42872712c452b05b986e810c56c38029d7438c369d5b72ab9322c5b26b966c2990290e026854360477062c49e9a08cc05d4b89f", 0x5c}, {&(0x7f0000001bc0)="8cd0471f7e56048017523359d7841bc156dd8391b58d75540890677a84d142c56a03d2eed1684de4674cf9276f2b477a6aa1e89a3854ee64f2307ab8bca64a0d6b8b0a9f877ec7d92c16d391178c9ffc17fd6fba77ad911885e8880facd7048bd637319a070f85d40071dc10d2517cb52c37ba1bafb59a687f5c05bce78d39", 0x7f}, {&(0x7f0000001c40)="e6ad28a36a26cd646080846bea330c2bd5b6955305d71939891a0a62c4d64a947ba7d607781e56af060c3dc5997b29728542c61eb2954526b85c251d402ff875390f515555c39b2dd4b6646d8fc946d88012a6a08e395de44fb6fa03437d539991dc9c1a987ce3c672d6ad401e971a44495e431e5117ab65441be9c6c8155789949a986ad4c7a5b8dd6224d659771e7368748292c7f584f5044297a14240482b19", 0xa1}, {&(0x7f0000001d00)="52b5357f6b9802c42a4c6bbb215ff4bb20d9c11c86f0b885d5e996ac17dcc04b7f1f49994548c0517cf3545cfc32f1701e53beac3d4cc036f81f0a581e9483a7682188946fd65b943720c0d3bb376235e32a1f27ccc591e59abc7123a10d648415f8a3aaeb4cfb409c9e8e", 0x6b}, {&(0x7f0000001d80)="11f31dc7c3086672f5f6021409b8944f528c53268ae8626d103b92fea1459b7b18bc89b88c89a1ea18f6a0f226eb5d5057a83ba8516ba574028506ed8bd80e302d65f80f5d77441dca1491d8f9029686c5daf6aff1c4225c06223b65c40735a50b6f4dfad5cb71a7406b9f7b13bb8b691cadff7cbcc5458b5df5ee3863d4e4840d2f177613ebe92cf62235ca3f3ed617577ac79de9ac", 0x96}, {&(0x7f0000001e40)="dccc47face14292c50a35552aab72f01d77b55069de87d85ad22e273c4ac66163ec83631060fdc7b5a534b251e51e53a5bd008c39c7c7b88f5f036a5f10515d0dcf84ffd8eead422f9fb71b2ef0ff4a89e5aa22492c18da0b01a4a76194e3bf0d95f045e5abeda6153e907281d63a7", 0x6f}, {&(0x7f0000001ec0)="082a9956d515d9cd49de97997dff95f3191278720bfce3a4d80e12f80f4414c76935d3dfa28b9d918a2a6899733c95accc2ae0070d05f211bb0557288d013be1958f718637d4988cc573bef7c888", 0x4e}, {&(0x7f0000001f40)="04cfb92cdacab110e87bde2dbfcbf985f940ae0cad848ea3aadbd8af6ddae7c8ed98fd5287cf4244a374216ba99d25e7ad9ce436da62f2b2a4e7a14d9a86eb7ca2c0507db8e5b4248138636279b25a20e18cabb044c4cd871bc58165701f6e969a50fb2b9bd7c4cd48b8df962cde5320bfc6a0a8464f22f804038176bb93d3ef7c2b10ff0d4feb742ba9349db6131d417a16f5ce4075ae31f01e8811b8", 0x9d}], 0x8, &(0x7f0000002080)=[@rthdrdstopts={{0x70, 0x29, 0x37, {0x2e, 0xa, '\x00', [@ra={0x5, 0x2, 0x3}, @generic={0x2, 0x36, "7f25e07333a06e6624f96e38a26526cb4845342c8bf61be35ab4f7b4fe72310df5b364042d6c7ee954a37c35873cf00a42d86ec7b1b1"}, @ra={0x5, 0x2, 0x4}, @hao={0xc9, 0x10, @mcast2}]}}}, @flowinfo={{0x14}}, @dstopts={{0x140, 0x29, 0x37, {0x32, 0x24, '\x00', [@pad1, @generic={0x40, 0xc9, "5055991e0bb82df03cf94be8ef6851c99aca94bbc6c9373c1a2d4cc6f1a60dcc0db44be855fbc37794b048e823f1b08bb0bfbccd129bd371502ae8056c622b5ee57f39471657af94a5e9a4956a85b4181e271732b62091bfa2528d6cc1d00f9b825125b918d89a5380928d443d8b1b17b6f4a34baed75ec636e3ee2f7799f05e122e53436779d5edd521921fa479825b17108e40211fe4ca01dba84d89e83428f26346c377626aa3fda01362204589fcf5fcc151b2da792c9951f253a07fca77fb3fe1a2543e366bd1"}, @calipso={0x7, 0x30, {0x2, 0xa, 0x7, 0x6, [0x10001, 0x3f, 0x1f, 0xbe, 0xf800000000000000]}}, @ra={0x5, 0x2, 0x5}, @hao={0xc9, 0x10, @private1}, @pad1, @enc_lim={0x4, 0x1, 0xb8}, @jumbo={0xc2, 0x4, 0x800}]}}}], 0x1c8}}, {{&(0x7f0000002280)={0xa, 0x4e21, 0x40, @dev={0xfe, 0x80, '\x00', 0x11}, 0xc63}, 0x1c, &(0x7f0000002480)=[{&(0x7f00000022c0)="1a2246f3a2aa2798e40e21b08d21a9c962b5386521e009bf7d20c7d154357e3a115fd623df3aae346a7e2b3dda9cb8d8881a4e7741e71bdff6f5b3f9eddbb003c553d9d925", 0x45}, {&(0x7f0000002340)="6a1d853ccafd856d01d37ed0fc4c2df96f", 0x11}, {&(0x7f0000002380)="9956d4a33ca3bb3f84e6ec6be6c65c0dbea857cac2425f715e4f2738ebb67fa98ffe99a9bbbb9d6a9802fc71319cd3690e3452b9f3274fe0afa429aa967bb199e6c753eec1c9822a45a59ce0c6d5a58c2b64ddc37ca00bb3c66b7cce203ad408f3e4c7af8d25ae2dcd3031aec48139ed9105a1bf0c2bd4ecf9539d833159cac10b2737b1160cd7bd587ff489727c3846feaa3ab6f7f078ec0fb52c0b735eb0f219d9d76fcac3dc27ea0932c1e56c8ffca389394292f82add1e930a7666be3e0e7018ebfa1ffbd3441d4ed145b9c809b73aa6fe1905a61b9cec1677c861b6441ce3e768c58cd402a372045fb0903fddd7eb9d6660c3", 0xf5}], 0x3, &(0x7f00000024c0)}}], 0x5, 0x4010) clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:37:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r1, 0x1000003) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r3 = dup2(r0, r2) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2000002, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@afid={'afid', 0x3d, 0x3}}, {@cache_none}, {@mmap}], [{@obj_user={'obj_user', 0x3d, '/.:^'}}]}}) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r6 = fcntl$dupfd(r5, 0x0, r4) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fsetxattr$security_capability(r6, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x7, 0x3}]}, 0x14, 0x3) r7 = socket(0x6, 0x4, 0x9) sendmsg$IPSET_CMD_SAVE(r7, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x44, 0x8, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x44}}, 0x8000) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)='security.capability\x00'], &(0x7f0000000700)=[&(0x7f0000000380)='\\,-%%\x00', &(0x7f00000004c0)='security.capability\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='\x00', &(0x7f00000006c0)='{\x00'], 0x400) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) creat(&(0x7f0000000740)='./file0\x00', 0x148) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x1000003) [ 2718.207294] 9pnet: Insufficient options for proto=fd 09:37:32 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000002, 0x1010, r0, 0x9ee14000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x7, 0x6, 0xdd5, 0x4}) [ 2718.297028] 9pnet: Insufficient options for proto=fd [ 2718.327499] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:37:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x7, 0x9, 0x5, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x6, 0x92}, 0x10000, 0x1, 0x3, 0x6, 0x81, 0x2, 0x8, 0x0, 0x2, 0x0, 0x8001}, 0x0, 0x6, r2, 0x13) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@loopback}, 0x0, @in6=@private2}}, &(0x7f00000004c0)=0xe8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r3, 0x0, r2) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = syz_open_dev$rtc(&(0x7f00000000c0), 0x5, 0x81) preadv2(r6, &(0x7f0000002740)=[{&(0x7f0000000140)=""/224, 0xe0}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/108, 0x6c}, {&(0x7f0000000340)=""/254, 0xfe}, {&(0x7f0000001480)=""/93, 0x5d}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/216, 0xd8}, {&(0x7f0000002600)=""/240, 0xf0}, {&(0x7f0000002700)=""/20, 0x14}], 0xa, 0x3, 0xffff, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r5, 0x0, r4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRESOCT=r4], 0xfdef) 09:37:32 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:37:32 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2718.611977] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2718.671022] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2733.164441] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2733.167579] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:37:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x2000ffaf) 09:37:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x1) stat(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) r4 = syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f00000002c0)='./file1\x00', 0x3, 0xa, &(0x7f0000000a80)=[{&(0x7f0000000300)="42134b4b2b813fe0", 0x8, 0x3}, {&(0x7f00000001c0)="81fbebc28a106894fe783e521de325b2", 0x10, 0x800000007}, {&(0x7f0000000640)="9854cbada7997023fdb825d318018ca5786fb4dffbb3e310d2657939d2ffa68808358c5b69dd502e458d7354950f9110320aae50b9bcf3901370d96a7a2e2e9a2ddcee755314a9b17c118c968c857243e857f2931a0f025796a5294c5c05a95b45b4e3174ad9fc4d869d1dee011adfb33ad3a4c04e151f3012e7b3a3165e1247edfa4d063a71b020e9bda0e56486ae3b726ec945072d4382df98a1db12ffe5ba8665b4b55f68cac6e0527525c3c39d5c0bd372e672125b4f8b9e836ae5ed2a875b0aba21f5d7e6fffdc57a57f6fa5144cb3aaf1b95ccda8e10791f803c5c6a13939d56386970bdee87b79160ed", 0xed, 0xfff}, {&(0x7f0000000740)="fe44d105f1e9bef330d05d2bd723f85bb00dee3b67f93a5db975d6f98cabcc9753eb71b1f64ebfca2265b87c8183afa6b68a09a3778173186e2d5a492e321498230655e5077e8d542234", 0x4a, 0x1e137135}, {&(0x7f0000000180)="3075d79918899f8a55abd00aa7174267c2144718c56352ab0c3ffa89c26835260288cd4113272ebac0c4e935df687222e372ace697eaac2b3fdb3108e547ae", 0x3f, 0x4}, {&(0x7f00000007c0)="2530f6cd7c7da1eb954b8165065be8cd4b39154381ee5c2c7fbf645f3420db2bd787888f83f964e6eb4e4782ed1d274b7d0d1627610313bea50e5e87d13ff249b20b0af3b72386bad20fafacdba99264af458e4923207909a7e0b7649ae929aa84c2c167aa60e27ce1", 0x69, 0x2}, {&(0x7f0000001400)="0b39234df83cbf5a24b32ca3cb5e18d35cdf9d81916920f17f83b7546515077a45b5bbe0c039267d1aae2c06522a0950e91b7d27d3e31b9701046aaff99e55efa202b3f844d794c4a158670e338851d063593c63bfc5229e4a7402ef2177d6bf250d07b18dc7f28c1619a2ddc0e5c8467917578bdbc28f4d2fa22b45d60a5db2654eed5b3151a684530399d81263351c5a07368e209e7b0c6692612c64b540a6998cf69561be8df660ff4cd1cc9bdcd85557e266b17794a66d05e97a87ca0118e8bfb7abeaccfca1b416d29a58370b1a448b838def4339255c7b7ea30e6ba6a44057d1137e1c756a57d7030b37e7f37727a07cffcee6be1a00"/262, 0x106, 0x4}, {&(0x7f00000008c0)="ba487131979d0e6982f52817c5326d544d32ee1cf4085f3d1580c3a1ec91351731a6bf230a5b2859a245218afab41b244516098f0977adfa589a87ec1764d17bb9dfecea5e90ee7b561079afff3437d7439f4dbff4fdffe8c20b45d7a21d77cebef2978ae6199e8d334853f0de32d10b63c8e71374e7a031ada6283e3b0c13960901202a7e880e7b5de86dc1f4c9a4e06beab73e6a", 0x95, 0x7f}, {&(0x7f0000000980)="9f0d57f2f08bef05e98af98358f3a0f5f6e717f40e6aa1ee14d88f3449e876ca00d71a71c18305cb882ef2e282b9490925dd9b2442e7576ab7522a8f5f70400740abfbe84113e789ba17cb49898d468690ba703a540172c25936b130b5dc61d469d579eafe", 0x65, 0x7}, {&(0x7f0000000a00)="3a8fbc396e1ae20ab8b2a3223f86d87663bd53e18d9b2bfaff1ac9410765ba558bd54ae606a50eb69ae14d75ae14ff9fda155d90b755fe495659ae2c965f5cb579e5eeaa2134e0c7cf0851d77330da1eabcbe813c888d4c22cee6f58660c4066aad7535e9c057022dafeed204dc68211b017ba00d7761c7d37", 0x79, 0x81}], 0x50, &(0x7f0000001540)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB="2c75b6d76510753a98ecbc69643d", @ANYRESDEC=r2, @ANYBLOB="0819"]) write$binfmt_elf64(r4, &(0x7f0000000c40)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0xfa, 0x8, 0x1, 0x4, 0x3, 0x3e, 0x1f, 0xe0, 0x40, 0x2f, 0x0, 0xfffd, 0x38, 0x1, 0x0, 0x400, 0x3ff}, [], "c956d48ee9c3ebafc1bc601eb12d7e8284ab6253c99a0f4139e87582995c14d4e3ad4535dd22f41a0a6460c64956e66e7940efd11da2c99921f87c751f2457d1a1b5b5f29a61934032ad90e0f7434031f4c6bfd7842f18b4eb2d2c959bcab43f8f4da855b4d98f664022362caffc681e2a0ebafd49f7211103018c9edba42d259054c0e429965eea3706ea925944db6be6ab541d892ace9cf5500400cc46ad5ff35aee5898ac35200f9c8668494aded77c74e9485c460a9a08631ce220eca08b8fbf8d4fc621e7156563448e4da4be5aab800435d9710ee13ab4be9ced", ['\x00', '\x00', '\x00', '\x00']}, 0x51d) pidfd_send_signal(r1, 0x1c, &(0x7f00000011c0)={0x3c, 0x8e, 0x1}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) 09:37:47 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:37:47 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x444301) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:37:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x2100, 0x184) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xbffd) 09:37:47 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:37:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffdef) [ 2733.222281] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:37:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setxattr$incfs_size(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=0x1f, 0x8, 0x3) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000180)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:47 executing program 5: iopl(0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x46e2, 0x41) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) execveat(r3, 0x0, 0x0, &(0x7f0000000340)=[&(0x7f0000000380)='@\xbd\xb4^.wt_\'|+\xe9^\xe3%]F3\xed\xa9~M\xa6qL^\x06\b%\x93\xdd\xc3-\x17\xc5\xbc\xb6\x89J\xd16\xd8\xf1d\x13*\xd4\xa7\xf2v\x94r\xcdf\xf8&T\xfa46\xa4H\xf3L>.\xe3^\x84cY\x132+\xe1\n\n:p\x92v', &(0x7f0000000100)='\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='}\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000300)='\x00'], 0x802) open(&(0x7f00000001c0)='./file1\x00', 0x43e0c0, 0x4) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:47 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:37:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) r1 = syz_open_dev$loop(&(0x7f0000000100), 0x9, 0x2800) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2733.394853] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. 09:37:47 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r2, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r4, 0x0, r3) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0x80000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:37:47 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 2733.489086] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2733.530871] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:37:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, 0x0, 0x7, 0xffffffffffffffff, 0x1) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000180)="378dd2a1483ebd762aa2ba09dafa757be1cd0d75547c52f51e57c209d5934b70d1615ab1af7d0d868a15219aa4179b3af2e83817dfee8ada9e99d0b9bc36536e2201c4fca770e5ad867474a2b711ba5340edf70efe79b0d9308afd8640fc5eef7275a80cd4fc917b290d0cdd3086ad83e1f7e44914a9b6b954033e40af4794684cc5ec4cd73e6c8f6950993ccee985246cb13299e3e9fe3d45eb880a73e1df93f2ee3f009ac74721f19ca92b64f9787b8a0a802e0088896aca35bdf818d7a016a8f521e462b8c8d322e3b3911f3e83fbc6dc555a60fc03090b6514cc89851f6f9ffae013f2e9b3050e2410dd11ba84e2f2b65736d506c8fccc8c15804606ea", 0xff}, {&(0x7f0000000640)="e4bf68e54556103926c849f0cf3b08028a393c3df7940a46bcd6dfe64fc510d9153d810225b1b77bde7fcca3c53ad67e1b8a35ffa83ad5cad102a226d14fbd80d743d43eb02aa0383c88644d8269ce0634420a10a60cb0", 0x57}, {&(0x7f00000006c0)="b5df40741404d72db4b68246141933c21f8888b6cdf60b2c5ad765e62cfe82f81587982e208d31507b3ed82da3681cef3d44f3e318c04ab1d49fdf1c4607b858870834046296966eea399c6ea80e5d03504f2efc386fa4db41301bcc5d734b0a69671945bf1931d84576dda34eca66d0f41a0c9e286522af8c4c29f678398157d8d817430383ed65179d4cc81b211b868e15c9caffe02d71f3fa921663b4981970e3b87938e6a7cc074bbd42986db31a49bfab4ecd", 0xb5}, {&(0x7f0000000780)="9dd48a9c4e36a595e8bb7c56d223d0286344a473426ab3e6930a6886f469478b08781690e6f7a4cd96eaaa536406c8ce10b5b000298e7e1af611c8c148dd0f796cd5d44dc9623e1618aa4db9f6a0a77d81c786d1ae6a181caf2a5b2141217a2ca907aba09ed72209566bf9591827a8baaa685ef0fc4e992610b0c18b1759a5113e051877c67422d82691b216e4ddbdf221b94c6591baa9706a425b74f25aa495e89a13ccf9a6959e00af3fa072e17c78d7d2ab44d96a507c9116ebfa3ca3624582fc3031a78d0b16188882586314b2", 0xcf}], 0x4, &(0x7f0000000900)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3, r4}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r4}}}], 0x60, 0x180}, 0x800) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:37:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x3}, {0x8000000, 0x3}]}, 0x14, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) signalfd(r2, &(0x7f0000000100)={[0x7]}, 0x8) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, r4, 0x1, 0x0, 0x0, {0x14}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6tnl0\x00', r6, 0x29, 0xff, 0x8, 0x9, 0xa, @private0={0xfc, 0x0, '\x00', 0x1}, @remote, 0x700, 0x10, 0x400, 0x52a2}}) [ 2748.403550] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:38:02 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:38:02 executing program 1: r0 = clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() tkill(r3, 0x7) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, r3, 0x7, 0xffffffffffffffff, 0x1) kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r2, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) clone3(&(0x7f0000000340)={0x1000, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), {0x29}, &(0x7f00000001c0)=""/232, 0xe8, &(0x7f00000002c0)=""/75, &(0x7f0000000100)=[r0, r3, 0x0, r0, r0, 0x0, r0, r0, r0], 0x9, {r1}}, 0x58) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:38:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x3, 0x2, 0x2d, 0x0, 0x0, 0x81, 0x31000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x46, 0x1, @perf_bp={&(0x7f0000000100), 0xa}, 0x2004, 0x2, 0x7, 0x8, 0x7, 0x8, 0x4, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0xb) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, '\x00', 0x37}, 0x4}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x20000, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2154d4, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:02 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) 09:38:02 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:38:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfffffdef) 09:38:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f00000002c0)='system_u:object_r:tty_device_t:s0\x00', 0x22, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2748.411135] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2748.430543] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2748.434808] audit: type=1400 audit(1713087482.693:12): avc: denied { relabelto } for pid=17342 comm="syz-executor.4" name="file0" dev="sda" ino=16044 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=file permissive=1 [ 2748.443440] audit: type=1400 audit(1713087482.703:13): avc: denied { setattr } for pid=17342 comm="syz-executor.4" name="file0" dev="sda" ino=16044 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=file permissive=1 [ 2748.463102] audit: type=1400 audit(1713087482.716:14): avc: denied { getattr } for pid=17342 comm="syz-executor.4" path="/syzkaller-testdir464245961/syzkaller.hiSlD7/351/file0" dev="sda" ino=16044 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=file permissive=1 [ 2748.471432] audit: type=1400 audit(1713087482.730:15): avc: denied { append } for pid=17342 comm="syz-executor.4" path="/syzkaller-testdir464245961/syzkaller.hiSlD7/351/file0" dev="sda" ino=16044 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=file permissive=1 [ 2748.487141] audit: type=1400 audit(1713087482.746:16): avc: denied { write } for pid=17342 comm="syz-executor.4" name="file0" dev="sda" ino=16044 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=file permissive=1 09:38:02 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, 0x0) unshare(0x48020200) [ 2748.572265] audit: type=1400 audit(1713087482.831:17): avc: denied { relabelto } for pid=17342 comm="syz-executor.4" name="UDPv6" dev="sockfs" ino=60914 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=udp_socket permissive=1 [ 2748.577162] audit: type=1400 audit(1713087482.836:18): avc: denied { setattr } for pid=17342 comm="syz-executor.4" name="UDPv6" dev="sockfs" ino=60914 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=sock_file permissive=1 09:38:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) open(&(0x7f0000000200)='./file0\x00', 0x585840, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r4 = fcntl$dupfd(r3, 0x0, r2) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000240)={0x80000000, 0x91, 0x10000000, 0x0, 0xfffffffd}) r5 = open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0xa001) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x801, 0x0) copy_file_range(r5, &(0x7f0000000100)=0x8, r6, &(0x7f0000000180)=0x8, 0x7ff, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x80000000) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2748.602771] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2748.607487] syz-executor.0 (17348) used greatest stack depth: 23304 bytes left [ 2748.656822] audit: type=1400 audit(1713087482.916:19): avc: denied { unlink } for pid=281 comm="syz-executor.4" name="file0" dev="sda" ino=16044 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=file permissive=1 09:38:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0, 0x1}, 0x90, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) write$binfmt_elf64(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2576], 0xa16) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ftruncate(0xffffffffffffffff, 0x1000) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14a, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x400, 0xc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) pread64(r0, &(0x7f0000000540)=""/68, 0x44, 0x4000000000000000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000240), &(0x7f00000004c0)=@v1={0x1000000, [{0x4, 0x400}]}, 0xc, 0x3) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000100), &(0x7f0000000200)=@v2={0x2000000, [{0x3, 0x3f}, {0xb, 0x7}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000180)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:03 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 2748.852900] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:38:03 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {0x2b}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:38:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x33f000, 0x0) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0x50}, 0x1, 0x0, 0x0, 0x10000}, 0x8880) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2748.915455] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:38:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f00000002c0)='system_u:object_r:tty_device_t:s0\x00', 0x22, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0x400ff40bffd) [ 2760.905377] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2760.911439] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:38:15 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x0) 09:38:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@random={'user.', '-\x00'}) 09:38:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:38:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xffffffffffffff91) 09:38:15 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x5, 0x6, &(0x7f0000000700)=[{&(0x7f00000001c0)="2de2a95fee5241879035b2532b185a5e3cfa5337fff803036499cf5312c8ff04f28e8ffdb7b5853c775b3f32a930b492a5e25d5652525c580ea0cd6f75932734224d1d4ece2e944890b5f934c8d35c2e6b80e85b78ebdcbb66c507551cdca9a0bf52020cae754b9cc9ed4ea3e583dab76d30b4b6b3cabfb06cc0eb9a78178f8e59617c13272572e14d12bfa1b3805325873bbfb8e026e4b72a01d6a333176424371eda71ef881ea8d80be60a8a11897b1fd15fbe057eb69f9571ffb0223c5b626fddaa6d2f620a93", 0xc8, 0x3}, {&(0x7f00000002c0)="a4cfce03be26abeb161bb248a2f314382d479f8e065357fd2223cd8549940a3f182a2e4a40b313a8a950764aff6f9dd2dcf6f91af6983c2c2bae47c066c18dfb275680d930d26a78ea7a9eb3c0ec8fb3cebf6cf9363f50b06108e2c6cf406b702592214ded97a1fc12dae4fc574bd6218930be08f43343487de245c0e27127d68aec8acd0dcb7248156f29b884f0f63a2cb8bd772bae23fbcff9db0fceea94b240cac89e6f3f", 0xa6, 0x621}, {&(0x7f0000000380)="9ed0a4a7298d19b361df2c01d42f7f8182a0ed06a0f9f48c44a3f3e29b3d14b426b2dbc6da47010d25317a6f51e71a4765a8f06febd26e9666f02271c5626a35d9230bbed1cd32415cf1664e85192d90976db6ca37223875ec30380e012d283564efeb3561b52dd57cea0b9ac74fbb989b93ccfb2bd8bf6b5b6ffa5244da1c4584", 0x81, 0x400}, {&(0x7f00000000c0)="2d0dd059f2539a303d9591b995a5366b95a050254a584c12337b6680246f6da8d86164cb237f5955047a3409db8fe292b32f44d64f412f89befe426636f6bb894391ad8df6d1dcf91a7c27d5c7", 0x4d}, {&(0x7f0000000500)="f0036d96eabc600cfad84b227ce39d4b5577260bf57724b2276069c92f2196e999a5ce59c65625c45916e1bd86a33c95f6b663fb27f6f986e528542f4ea195fc63a2cea0efbc34354284423dd8bbb6f86c80350f0e53b2b60367d32d87964cfb88da9968b49fe4366f3884b59407f4a019d8658dd9be89917e9e01478cdf6615a786f11481def0a9048687acd1eb8e5452b07024a7cc5b466d58d6538d3fb12c74f2b67505bb844981987642798564cd553c16e4b4b49858908eb9c5fe50492cbc6130459e6cf89c4c0a756b", 0xcc, 0xe000000}, {&(0x7f0000000600)="592651964021b64acc769df96a1ee75b57d2312cff5c68dc483984ef7a707ac97212ea10876d0588b22f806aeccbf7efb2b854007543e6b6e5e251f4468446c6bc27d8f77477fee26973511915e3204234c7d4132f4330986f8d060e2cc71c475df722d734fbdd15d17a5d1e27746cf05a3a4103c86d1412c0c96b874f2c9caeba2e7d4bb2aefac1c8b2f025253dac3bbd77ae86fd43e2fb712afe3b52a338d8f3bc83bced8c7fc1746c0521b7a80a35024ba344e07e2d49600ee6962a27df1a22d7e436482a7b8f6d29a30979624ceb81", 0xd1, 0x1}], 0x8000, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@numtail}, {@utf8}, {@nonumtail}, {@fat=@quiet}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsroot={'smackfsroot', 0x3d, ':,'}}]}) 09:38:15 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, 0x0) unshare(0x48020200) [ 2760.953976] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:38:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x100100, 0x0) accept$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000140)=0x1c) 09:38:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x2, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:15 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x0) 09:38:15 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, 0x0) unshare(0x48020200) [ 2761.167435] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:38:15 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$TUNSETGROUP(r2, 0x400454ce, 0xee00) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f00000004c0)=0x100000ffffd) 09:38:15 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r1, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r1, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x5655fc0aeef59cf9, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2761.210270] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2761.228567] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:38:15 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x0) 09:38:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = fspick(r0, &(0x7f0000000300)='./file0\x00', 0x1) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000000c0)='\x00', 0x0, r0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x5) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x34, r6, 0x2, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xc1}]}]}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r6, 0x10, 0x70bd26, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x5, 0x21}}}}, [@NL80211_ATTR_FRAME={0x30, 0x33, @deauth={@wo_ht={{0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1}, {0x4}, @device_a, @broadcast, @from_mac=@device_b, {0xf}}, 0x26, @val={0x8c, 0x10, {0x9e6, "08a6ea2ae21a", @short="fabe7e466f3951de"}}}}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x156}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xfffffff9}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]]}, 0x68}, 0x1, 0x0, 0x0, 0x41}, 0x20000040) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f0000000480)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$sock_ifreq(r4, 0x8922, &(0x7f00000002c0)={'wlan0\x00', @ifru_settings={0x0, 0x0, @fr_pvc=&(0x7f0000000240)={0x1590}}}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) chdir(&(0x7f0000000100)='./file0\x00') stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2761.437951] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. 09:38:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffdef) 09:38:27 executing program 1: r0 = clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r2, 0x40049421, 0x2) r3 = gettid() tkill(r3, 0x7) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, r3, 0x7, r2, 0x1) kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r2, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r5, 0x0, r4) finit_module(r4, &(0x7f0000000480)=']\x00', 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x2b0, 0xff8c, 0x4, 0x70bd2a, 0x25dfdbfd, {0x9}, [@nested={0x127, 0x24, 0x0, 0x1, [@typed={0x8, 0x77, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic='\n', @typed={0x14, 0x1e, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @generic="5b26b0166ef5480b7d58d388bee86500a82c9c952478642b1e8eb16a89a99f4c9195367ba6cb109c5d6669b4e7d20200ab56793f7be61532e732e86f35b42e915c618def69270470c89a8642a526d33eeb7aac5858c8773ed5b18ab97fd0eb29d9", @generic="aa82475dad4d8bfd8227bc51dfbd16741ecc0a769dddcf4feb5991796670bd71d8e4de417f3af6bf9d7be829ef0325c528465461bdb3910bd2560b6f0e40894f7ea71aca18f51647c3d553f830afa41c0a7556ea2d45ba0089e5307b95e5ba589d73438ec836cd8253ed02dfc4ad9c43d42c", @typed={0x8, 0xc, 0x0, 0x0, @pid=r0}, @typed={0x8, 0x22, 0x0, 0x0, @ipv4=@local}, @typed={0x8, 0x52, 0x0, 0x0, @fd}, @generic="231f22771733139ec617a7611bbe42bfa0321da8144fb634e49729", @generic]}, @generic="44a6db90039a265ebb80d95b70e7053e5e3800610ff1867a65128096c68c5981c276b295d33d6a3ceb7290cdedea4a9c349a3769ee6b2093cca49b2fd1c0eb160d140e766fb1775613410b8fc26aa59508a0684c593f9043a5e670fa67dd139d2ae581f669e79418265fe38cdcd949bda1e354dcd539347e987b4a0559cf4b28facc18dd7360c1edeee10029d723dbe15e1565402f9828d0de3765a717657b837cf4dcc5550944959a15d42af9da931f90bace04695e0eb816d0ba11bb6128d038e7e8b4faa64760cf437f91a0146f54b4e7458eae88276d2298c43ac5e7ff67", @nested={0x94, 0x7e, 0x0, 0x1, [@generic="8b7d90c36c2b4a20bf63b733", @generic="63223b7fdbdd0ae65c028017235e3d9dacaa49d197e3603df30fd352e13adf1b18f6e70473a910ba4df0b394c8e3d38fa40c7392db824a24a5bb6628277664b97eff29c18d1e67e51c79e5a7d52447fa3323233891ea176f5cf22c10e8d1653a731c5aa0304fc346fa97f4414fd553d9caf53af878d32e274ca61911a7382ac9b1d79290"]}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:38:27 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, 0x0) unshare(0x48020200) 09:38:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:27 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, 0x0) unshare(0x48020200) 09:38:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000001c0)='\xb4Pv\x96X\x1b\x89W\x99\xae\x97%\x1d\b\x95\xca9\x1cXM9\xcc3\xd6\xd6\xd3\x04\xde\x9e\xb2\xa0\x1d\x00`Ea.\xb2+3~\xe2 \x8f)\xdbu\xfc\xda\xaek\xb5\x80\xa7\xda\xd7d$Nk\xdf\tU\xc1\xfa$m\x14=2T\x16\xa2\to\x85\xf1\xe1\x98\xe5\x80', &(0x7f0000000640)='security.capabolit\x86)\x88K\x9aT\xf8j\xee\x19E\xf2\xd5E\xc1\x7f$\xb4\xb5\xa7rG\xa8\xf7\xf5\x19\xfa\x1a\x92\xbd\a\x866\xf3@\xdb\xf1d*d\xc0\xe4@qM\x10\xdb\xc6v\x98\x11\"i\t\x00\xe1\xccK\xf6\x8f6\xaa\xbf?ci@0o\x15\xef\x95\xa4\x9f\xc4JzTN\xbe\x9d\xff\x1f\x9f\x11\xfa^\x1d\xf8\x7f\r\xd3\xf0U\x8f', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_dev$vcsu(&(0x7f0000000240), 0x25b, 0x40) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/sync_on_suspend', 0x400000, 0x111) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000180)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) chdir(&(0x7f0000000100)='./file0\x00') stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000005c0)={0xfffffffffffffffe, [{}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000003e640)={0xfffffffffffff001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "4e7ea597f5ddc1"}) r11 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r12 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r12, 0xd000943d, &(0x7f000005cb80)={0xfffffffffffffffe, [{}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {0x0, 0x0}], 0x7f, "e1ffffff000004"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000003f640)={0x0, ""/256, 0x0}) r17 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r18 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r17, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r18, 0xd000943d, &(0x7f000005cb80)={0xfffffffffffffffe, [{}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000003f840)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {r9}, {r13}, {}, {r16}, {r19}], 0x81, "2d8ece7c3c057b"}) [ 2773.651982] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2773.675463] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2773.681963] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further 09:38:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080), 0xc, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000100)) 09:38:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x4982, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r2, 0x0, r1) fallocate(r2, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r3, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r3, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x9, 0x7, 0x3, 0x80000000, 0x3, 0x6, 0xfffffff7, 0xf6, 0x40, 0x388, 0x101, 0x3ff, 0x38, 0x2, 0xff82, 0xffff, 0x4}, [{0x3, 0x5, 0x3800, 0x7f, 0x1, 0x1, 0x7, 0x2}], "8cfd7572811a9287a1ef48642b1ddc", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa87) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) unshare(0x48020200) 09:38:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000001c0)='\xb4Pv\x96X\x1b\x89W\x99\xae\x97%\x1d\b\x95\xca9\x1cXM9\xcc3\xd6\xd6\xd3\x04\xde\x9e\xb2\xa0\x1d\x00`Ea.\xb2+3~\xe2 \x8f)\xdbu\xfc\xda\xaek\xb5\x80\xa7\xda\xd7d$Nk\xdf\tU\xc1\xfa$m\x14=2T\x16\xa2\to\x85\xf1\xe1\x98\xe5\x80', &(0x7f0000000640)='security.capabolit\x86)\x88K\x9aT\xf8j\xee\x19E\xf2\xd5E\xc1\x7f$\xb4\xb5\xa7rG\xa8\xf7\xf5\x19\xfa\x1a\x92\xbd\a\x866\xf3@\xdb\xf1d*d\xc0\xe4@qM\x10\xdb\xc6v\x98\x11\"i\t\x00\xe1\xccK\xf6\x8f6\xaa\xbf?ci@0o\x15\xef\x95\xa4\x9f\xc4JzTN\xbe\x9d\xff\x1f\x9f\x11\xfa^\x1d\xf8\x7f\r\xd3\xf0U\x8f', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_open_dev$vcsu(&(0x7f0000000240), 0x25b, 0x40) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/sync_on_suspend', 0x400000, 0x111) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000180)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)={0xd8, 0x3c, 0x200, 0x70bd2b, 0x25dfdbff, {0x18}, [@generic="4f064b38b2d8f36ac3e8fd3706ebce2ad655f31839d1aeea32c454ba7bef53fbe27f3d9c90b321e20a52d4ee7b00394b6e2c49fe3a2282bff4d2adda4ed95738380eb0b6dc5d94a24c7e4a786e4c8f6bef7ea5041b669b37c8ccb1d860eeea3c0aa04c88a225d07acc0b3cc7555819d9bac8cbfcb1e096e6ef3bcc491651fdefb20cc4197f8e1114863483f0e688bbd99bd029760a4c8823bcf2083d93ac0e2761acc1ff95f5e1266362e9", @typed={0x5, 0x67, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x1e, 0x0, 0x0, @fd}, @typed={0x8, 0x78, 0x0, 0x0, @uid}]}, 0xd8}, 0x1, 0x0, 0x0, 0x184}, 0x0) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x9) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f00000002c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setstatus(r1, 0x4, 0x6000) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2773.897602] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 09:38:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@random={'user.', '-\x00'}) 09:38:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000, 0x5, &(0x7f0000001540)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f00000002c0)="7dabdf53eb214337ec4c47c837919067f65ab603d912c81974108cc29ae1d28af4b62df7d4f9b45d9cc1a354af16632654286ec7b48cc97829d1597f28f0b3cd875ff9d0fe260f68f2d41c9179ad3a40f335491907e40d64540c8e3b3ed3", 0x5e, 0x200}, {&(0x7f0000000340)="ed541060d4852b80a97ee6186f090bdae2fd511b8a996ac6b61608d019195130fca72854a4ce9b929ffa7b6a5e617321a48d099ce35bcc7dcf98bcf2153fb546cbf6103ededa8170a694534592816c5fe6d9860580843a", 0x57, 0x2}, {&(0x7f0000001480)="417c72045207732e0f0f77331b5936e3bdc62f4b0decf674299a8900478ac6270a55294fbc77587bccdea12ca4163d70a74fcc6469ab073865571b06c29c6f6a81b21ec67be5693953197de07b466031ff8c7ae737ad6bf7e81104ac18084818622b09412ef415a10a6c9631c415f02c336ef70fe8429836707aff01639f87fae2a447e01f0c19c27a7878e88ed68921dc8dc61adfa03869b1de127bf0804c3d85838f210cbf82", 0xa7, 0xa37}, {&(0x7f00000003c0)="ca59efa205c5b870b3de9f86a5f076127d014a899bbf3d404a15978ef1a2d63ef5b105a0e2d552de98a5edcdc79aaa5df54e881760d7e18e522c89a0975de0c1b22908282092ccd6bec82b8514f04795", 0x50, 0x86}], 0x200000, &(0x7f00000015c0)={[{@fat=@umask={'umask', 0x3d, 0x8}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@shortname_mixed}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'cp949'}}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) sendmsg$nl_generic(r2, &(0x7f0000001980)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000001d80)=ANY=[@ANYBLOB="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"], 0x3c4}, 0x1, 0x0, 0x0, 0x24040040}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) getpeername(r1, &(0x7f00000000c0)=@can, &(0x7f0000000140)=0x80) 09:38:28 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file1\x00', 0x200801, 0xeb) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:38:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x80000000, 0x200, 0x0, 0x20}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) unshare(0x48020200) 09:38:40 executing program 1: clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x10000100000) 09:38:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r2, 0x0, r1) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x10, &(0x7f0000001080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x1}}, {@version_L}, {@posixacl}, {@noextend}, {@access_user}, {@cache_mmap}, {@access_user}, {@loose}, {@version_u}], [{@pcr={'pcr', 0x3d, 0x3d}}, {@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '\x00'}}]}}) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xa09) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x10049, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x0, 0x103, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:40 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:38:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000300)={0x0, 0x2}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000002c0)=0x8) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESDEC], 0xfdef) 09:38:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000000)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef7a97c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024db4d3ec4b7b6dc1", 0x3b, 0xc, 0x1}, 0x9) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000540)="18726d0eed55eaa57fc580dc3a0b12e0a5ee08da294ac8119c4c73f93694f2a935d17a81959d084839f846dca8739131e4a9c45c6509af44529537eae3b5a4793a9a0aacfd7a75f2b566b874939829b82a35d20d1985a92c5d7ba971251e89286f64438db33a7f05fb0d1707fd3fa27a56032a79c1d09558fbbfcb2e5f36d3e7e1c749ad35c2064fa087cf6359507a36eb69853e0cdd920cbb7586aedf5a2e5a9a1a6b8d11c08a14918b01d07c92179dfae1ef58835b5fa4be28fbd3b3eac1c9f3cf74fbe25748c55d23902439133eecfafb2e0f", 0xd4, 0xfffffffffffffffa) add_key(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000440), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) 09:38:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() tkill(r3, 0x7) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8001, 0x130, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x401, 0x0, 0x10001}, r3, 0x7, 0xffffffffffffffff, 0x1) kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r2, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2786.440364] EXT4-fs warning (device sda): ext4_group_extend:1813: need to use ext2online to resize further [ 2786.461307] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2786.468153] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2786.469888] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2786.475328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10332 comm=kworker/0:0 09:38:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x484ee2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x81) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pidfd_send_signal(r0, 0x30, &(0x7f00000005c0)={0x2f, 0x3ff, 0x70}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000140)={'vcan0\x00', {0x2, 0x0, @private}}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000300)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2786.598330] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10332 comm=kworker/0:0 09:38:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) stat(&(0x7f0000000580)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3, {r4, 0xffffffffffffffff}}, './file0\x00'}) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_int(r5, 0x1, 0x24, 0x0, &(0x7f0000001080)) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$KDSKBLED(r1, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000004c0)=0x3, 0x4) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:38:40 executing program 1: clone3(&(0x7f0000000140)={0x200, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)=0x3) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=@v1={0x1000000, [{0x9, 0x1}]}, 0xc, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x52, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) openat(r3, &(0x7f00000000c0)='./file1\x00', 0x4000, 0xd6) 09:38:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)=[0x0], 0x1000) ftruncate(r0, 0x1000003) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, 0x0, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r2, 0x0, r1) fcntl$getown(r2, 0x9) openat$full(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f0000000480)={0x0, 0x0, "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", "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"}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) dup(r0) VM DIAGNOSIS: 09:43:41 Registers: info registers vcpu 0 RAX=ffffffff83e6ae20 RBX=0000000000000000 RCX=ffffffff83e52c1c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6b428 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85673e08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e6ae2e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f71e1530010 CR3=000000000da7a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00c202fe016c6c6f502e726567616e61 XMM02=45f02933aae83f940df4dd1286386006 XMM03=9bd989ef47ab2b705ebae2a2c3ad1e25 XMM04=5d54aa32782929397bb3f4de86a27ca3 XMM05=d724eb06dc3a53bfb50141b06854489f XMM06=49bc8da3d26c74b8d80ca87c591d36f9 XMM07=49e284d9bcce52b2ae599424e9086a8b XMM08=6666783028617363762474616e65706f XMM09=202c6339666666666666666666666666 XMM10=30383230303030303030663778302826 XMM11=7277700a29307830202c307830202c29 XMM12=663778302826202c3072283276657469 XMM13=78307b5b3d2930343430303030303030 XMM14=2c327830202c5d7d3078307b202c7d30 XMM15=0a29307830202c307830202c30783020 info registers vcpu 1 RAX=ffffffff83e6ae20 RBX=0000000000000001 RCX=ffffffff83e52c1c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6b428 RBP=ffffed1001130000 RSP=ffff88800898fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85673e08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e6ae2e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555a9d6f2678 CR3=000000000da7a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000415bf3f800000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000