0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 992.478876] __pmd_alloc+0x94/0x5e0 [ 992.479316] handle_mm_fault+0x1ac4/0x3500 [ 992.479688] ? perf_trace_lock+0x2bd/0x490 [ 992.480057] ? __lockdep_reset_lock+0x180/0x180 [ 992.480456] ? __pmd_alloc+0x5e0/0x5e0 [ 992.480836] __get_user_pages+0x6ec/0x1620 [ 992.481218] ? follow_page_mask+0x1900/0x1900 [ 992.481604] ? __lockdep_reset_lock+0x180/0x180 [ 992.482005] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 992.482420] __get_user_pages_remote+0x1d5/0x870 [ 992.482829] ? lock_downgrade+0x6d0/0x6d0 [ 992.483196] get_user_pages_remote+0x63/0x90 [ 992.483583] get_arg_page+0xba/0x200 [ 992.483907] ? acct_arg_size+0xe0/0xe0 [ 992.484241] ? downgrade_write+0x3a0/0x3a0 [ 992.484608] ? count.constprop.0+0x1b3/0x290 [ 992.485002] copy_string_kernel+0x1b4/0x450 [ 992.485385] do_execveat_common+0x525/0x8d0 [ 992.485758] ? bprm_execve+0x1960/0x1960 [ 992.486127] __x64_sys_execveat+0xed/0x140 [ 992.486495] do_syscall_64+0x33/0x40 [ 992.486814] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 992.487251] RIP: 0033:0x7f93566ecb19 [ 992.487570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 992.489106] RSP: 002b:00007f9353c62188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 992.489760] RAX: ffffffffffffffda RBX: 00007f93567fff60 RCX: 00007f93566ecb19 [ 992.490360] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 992.490972] RBP: 00007f9353c621d0 R08: 0000000000000000 R09: 0000000000000000 [ 992.491565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 992.492168] R13: 00007ffc0e8e1def R14: 00007f9353c62300 R15: 0000000000022000 01:21:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 01:21:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 01:21:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) [ 992.636537] FAULT_INJECTION: forcing a failure. [ 992.636537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 992.638452] CPU: 1 PID: 8958 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 992.639453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 992.640646] Call Trace: [ 992.641055] dump_stack+0x107/0x167 [ 992.641599] should_fail.cold+0x5/0xa [ 992.642165] __alloc_pages_nodemask+0x182/0x600 [ 992.642845] ? __lockdep_reset_lock+0x180/0x180 [ 992.643530] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 992.644399] ? add_mm_counter_fast+0x220/0x220 [ 992.645101] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 992.645875] alloc_pages_current+0x187/0x280 [ 992.646535] get_zeroed_page+0x14/0xb0 [ 992.647109] __pud_alloc+0x33/0x270 [ 992.647655] handle_mm_fault+0x1a73/0x3500 [ 992.648278] ? perf_trace_lock+0x2bd/0x490 [ 992.648915] ? __lockdep_reset_lock+0x180/0x180 [ 992.649666] ? __pmd_alloc+0x5e0/0x5e0 [ 992.650291] __get_user_pages+0x6ec/0x1620 [ 992.650941] ? follow_page_mask+0x1900/0x1900 [ 992.651598] ? __lockdep_reset_lock+0x180/0x180 [ 992.652281] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 992.653003] __get_user_pages_remote+0x1d5/0x870 [ 992.653696] ? lock_downgrade+0x6d0/0x6d0 [ 992.654321] get_user_pages_remote+0x63/0x90 [ 992.654976] get_arg_page+0xba/0x200 [ 992.655532] ? acct_arg_size+0xe0/0xe0 [ 992.656105] ? downgrade_write+0x3a0/0x3a0 [ 992.656723] ? count.constprop.0+0x1b3/0x290 [ 992.657390] copy_string_kernel+0x1b4/0x450 [ 992.658044] do_execveat_common+0x525/0x8d0 [ 992.658686] ? bprm_execve+0x1960/0x1960 [ 992.659320] __x64_sys_execveat+0xed/0x140 [ 992.659949] do_syscall_64+0x33/0x40 [ 992.660502] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 992.661259] RIP: 0033:0x7fa50365eb19 [ 992.661811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 992.664447] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 992.664651] FAULT_INJECTION: forcing a failure. [ 992.664651] name failslab, interval 1, probability 0, space 0, times 0 [ 992.665584] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 992.665600] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 992.665614] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 992.665625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 992.665637] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 992.669522] CPU: 0 PID: 8960 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 992.670069] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 992.670729] Call Trace: [ 992.670951] dump_stack+0x107/0x167 [ 992.671250] should_fail.cold+0x5/0xa [ 992.671565] ? __pmd_alloc+0x94/0x5e0 [ 992.671878] should_failslab+0x5/0x20 [ 992.672194] kmem_cache_alloc+0x5b/0x310 [ 992.672548] __pmd_alloc+0x94/0x5e0 [ 992.672865] handle_mm_fault+0x1ac4/0x3500 [ 992.673212] ? perf_trace_lock+0x2bd/0x490 [ 992.673562] ? __lockdep_reset_lock+0x180/0x180 [ 992.673941] ? __pmd_alloc+0x5e0/0x5e0 [ 992.674280] __get_user_pages+0x6ec/0x1620 [ 992.674634] ? follow_page_mask+0x1900/0x1900 [ 992.675002] ? __lockdep_reset_lock+0x180/0x180 [ 992.675381] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 992.675779] __get_user_pages_remote+0x1d5/0x870 [ 992.676163] ? lock_downgrade+0x6d0/0x6d0 [ 992.676508] get_user_pages_remote+0x63/0x90 [ 992.676872] get_arg_page+0xba/0x200 [ 992.677178] ? acct_arg_size+0xe0/0xe0 [ 992.677495] ? downgrade_write+0x3a0/0x3a0 [ 992.677842] ? count.constprop.0+0x1b3/0x290 [ 992.678207] copy_string_kernel+0x1b4/0x450 [ 992.678566] do_execveat_common+0x525/0x8d0 [ 992.678918] ? bprm_execve+0x1960/0x1960 [ 992.679267] __x64_sys_execveat+0xed/0x140 [ 992.679616] do_syscall_64+0x33/0x40 [ 992.679921] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 992.680335] RIP: 0033:0x7ff1f507cb19 01:21:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 992.680635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 992.682241] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 992.682861] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 992.683433] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 992.684003] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 992.684572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 992.685150] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 [ 992.711519] FAULT_INJECTION: forcing a failure. [ 992.711519] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 992.712643] CPU: 0 PID: 8968 Comm: syz-executor.2 Not tainted 5.10.223 #1 [ 992.713180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 992.713843] Call Trace: [ 992.714061] dump_stack+0x107/0x167 [ 992.714362] should_fail.cold+0x5/0xa [ 992.714682] __alloc_pages_nodemask+0x182/0x600 [ 992.715061] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 992.715543] ? find_held_lock+0x2c/0x110 [ 992.715882] ? __pmd_alloc+0x2db/0x5e0 [ 992.716204] ? lock_downgrade+0x6d0/0x6d0 [ 992.716545] ? do_raw_spin_lock+0x121/0x260 [ 992.716910] alloc_pages_current+0x187/0x280 [ 992.717272] pte_alloc_one+0x16/0x1a0 [ 992.717581] __pte_alloc+0x1d/0x330 [ 992.717888] handle_mm_fault+0x287f/0x3500 [ 992.718233] ? perf_trace_lock+0x2bd/0x490 [ 992.718576] ? __lockdep_reset_lock+0x180/0x180 [ 992.718953] ? __pmd_alloc+0x5e0/0x5e0 [ 992.719301] __get_user_pages+0x6ec/0x1620 [ 992.719658] ? follow_page_mask+0x1900/0x1900 [ 992.720029] ? __lockdep_reset_lock+0x180/0x180 [ 992.720406] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 992.720808] __get_user_pages_remote+0x1d5/0x870 [ 992.721200] ? lock_downgrade+0x6d0/0x6d0 [ 992.721551] get_user_pages_remote+0x63/0x90 [ 992.721922] get_arg_page+0xba/0x200 [ 992.722231] ? acct_arg_size+0xe0/0xe0 [ 992.722551] ? downgrade_write+0x3a0/0x3a0 [ 992.722901] ? count.constprop.0+0x1b3/0x290 [ 992.723267] copy_string_kernel+0x1b4/0x450 [ 992.723629] do_execveat_common+0x525/0x8d0 [ 992.723987] ? bprm_execve+0x1960/0x1960 [ 992.724334] __x64_sys_execveat+0xed/0x140 [ 992.724685] do_syscall_64+0x33/0x40 [ 992.724997] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 992.725417] RIP: 0033:0x7f93566ecb19 [ 992.725720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 992.727189] RSP: 002b:00007f9353c62188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 992.727831] RAX: ffffffffffffffda RBX: 00007f93567fff60 RCX: 00007f93566ecb19 [ 992.728405] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 992.728977] RBP: 00007f9353c621d0 R08: 0000000000000000 R09: 0000000000000000 [ 992.729545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 992.730116] R13: 00007ffc0e8e1def R14: 00007f9353c62300 R15: 0000000000022000 01:21:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 01:21:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 01:21:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 01:21:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 01:21:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1005.508099] FAULT_INJECTION: forcing a failure. [ 1005.508099] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.509917] CPU: 0 PID: 9085 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 1005.510897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1005.512071] Call Trace: [ 1005.512472] dump_stack+0x107/0x167 [ 1005.513032] should_fail.cold+0x5/0xa [ 1005.513620] ? create_object.isra.0+0x3a/0xa20 [ 1005.514272] should_failslab+0x5/0x20 [ 1005.514820] kmem_cache_alloc+0x5b/0x310 [ 1005.515417] create_object.isra.0+0x3a/0xa20 [ 1005.516040] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1005.516768] kmem_cache_alloc+0x159/0x310 [ 1005.517397] __pmd_alloc+0x94/0x5e0 [ 1005.517923] handle_mm_fault+0x1ac4/0x3500 [ 1005.518530] ? perf_trace_lock+0x2bd/0x490 [ 1005.519133] ? __lockdep_reset_lock+0x180/0x180 [ 1005.519790] ? __pmd_alloc+0x5e0/0x5e0 [ 1005.520391] __get_user_pages+0x6ec/0x1620 [ 1005.521026] ? follow_page_mask+0x1900/0x1900 [ 1005.521668] ? __lockdep_reset_lock+0x180/0x180 [ 1005.522329] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1005.523026] __get_user_pages_remote+0x1d5/0x870 [ 1005.523704] ? lock_downgrade+0x6d0/0x6d0 [ 1005.524310] get_user_pages_remote+0x63/0x90 [ 1005.524960] get_arg_page+0xba/0x200 [ 1005.525496] ? acct_arg_size+0xe0/0xe0 [ 1005.526049] ? downgrade_write+0x3a0/0x3a0 [ 1005.526656] ? count.constprop.0+0x1b3/0x290 [ 1005.527313] copy_string_kernel+0x1b4/0x450 [ 1005.527949] do_execveat_common+0x525/0x8d0 [ 1005.528572] ? bprm_execve+0x1960/0x1960 [ 1005.529185] __x64_sys_execveat+0xed/0x140 [ 1005.529789] do_syscall_64+0x33/0x40 [ 1005.530317] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1005.531041] RIP: 0033:0x7ff1f507cb19 [ 1005.531571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1005.532232] FAULT_INJECTION: forcing a failure. [ 1005.532232] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.534099] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1005.534122] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 1005.534134] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1005.534146] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.534163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1005.540248] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 [ 1005.541318] CPU: 1 PID: 9087 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1005.541484] hpet: Lost 1 RTC interrupts [ 1005.542024] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1005.542038] Call Trace: [ 1005.543676] dump_stack+0x107/0x167 [ 1005.544021] should_fail.cold+0x5/0xa [ 1005.544377] ? __pmd_alloc+0x94/0x5e0 [ 1005.544736] should_failslab+0x5/0x20 [ 1005.545096] kmem_cache_alloc+0x5b/0x310 [ 1005.545478] __pmd_alloc+0x94/0x5e0 [ 1005.545822] handle_mm_fault+0x1ac4/0x3500 [ 1005.546041] FAULT_INJECTION: forcing a failure. [ 1005.546041] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1005.546224] ? perf_trace_lock+0x2bd/0x490 [ 1005.548244] ? __lockdep_reset_lock+0x180/0x180 [ 1005.548666] ? __pmd_alloc+0x5e0/0x5e0 [ 1005.549035] __get_user_pages+0x6ec/0x1620 [ 1005.549439] ? follow_page_mask+0x1900/0x1900 [ 1005.549823] ? __lockdep_reset_lock+0x180/0x180 [ 1005.550252] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1005.550684] __get_user_pages_remote+0x1d5/0x870 [ 1005.551130] ? lock_downgrade+0x6d0/0x6d0 [ 1005.551529] get_user_pages_remote+0x63/0x90 [ 1005.551950] get_arg_page+0xba/0x200 [ 1005.552292] ? acct_arg_size+0xe0/0xe0 [ 1005.552642] ? downgrade_write+0x3a0/0x3a0 [ 1005.553039] ? count.constprop.0+0x1b3/0x290 [ 1005.553447] copy_string_kernel+0x1b4/0x450 [ 1005.553849] do_execveat_common+0x525/0x8d0 [ 1005.554242] ? bprm_execve+0x1960/0x1960 [ 1005.554632] __x64_sys_execveat+0xed/0x140 [ 1005.555024] do_syscall_64+0x33/0x40 [ 1005.555366] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1005.555825] RIP: 0033:0x7fa50365eb19 [ 1005.556161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1005.557775] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1005.558444] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1005.559071] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1005.559700] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.560327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1005.561034] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1005.561692] CPU: 0 PID: 9081 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1005.562686] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1005.563880] Call Trace: [ 1005.564277] dump_stack+0x107/0x167 [ 1005.564822] should_fail.cold+0x5/0xa [ 1005.565404] __alloc_pages_nodemask+0x182/0x600 [ 1005.566088] ? lock_acquire+0x197/0x470 [ 1005.566675] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1005.567567] ? lock_downgrade+0x6d0/0x6d0 [ 1005.568174] ? do_raw_spin_lock+0x121/0x260 [ 1005.568818] alloc_pages_current+0x187/0x280 [ 1005.569488] __pmd_alloc+0x37/0x5e0 [ 1005.570036] handle_mm_fault+0x1ac4/0x3500 [ 1005.570665] ? perf_trace_lock+0x2bd/0x490 [ 1005.571294] ? __lockdep_reset_lock+0x180/0x180 [ 1005.571977] ? __pmd_alloc+0x5e0/0x5e0 [ 1005.572604] __get_user_pages+0x6ec/0x1620 [ 1005.573245] ? follow_page_mask+0x1900/0x1900 [ 1005.573907] ? __lockdep_reset_lock+0x180/0x180 [ 1005.574569] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1005.575271] __get_user_pages_remote+0x1d5/0x870 [ 1005.575953] ? lock_downgrade+0x6d0/0x6d0 [ 1005.576586] get_user_pages_remote+0x63/0x90 [ 1005.577240] get_arg_page+0xba/0x200 [ 1005.577785] ? acct_arg_size+0xe0/0xe0 [ 1005.578342] ? downgrade_write+0x3a0/0x3a0 [ 1005.578962] ? count.constprop.0+0x1b3/0x290 [ 1005.579624] copy_string_kernel+0x1b4/0x450 [ 1005.580259] do_execveat_common+0x525/0x8d0 [ 1005.580894] ? bprm_execve+0x1960/0x1960 [ 1005.581508] __x64_sys_execveat+0xed/0x140 [ 1005.582124] do_syscall_64+0x33/0x40 [ 1005.582660] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1005.583378] RIP: 0033:0x7f3739cfbb19 [ 1005.583910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1005.586505] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1005.587584] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1005.588590] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1005.589607] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.590608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1005.591611] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1005.592770] hpet: Lost 1 RTC interrupts 01:21:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:21:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 01:21:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1005.748070] FAULT_INJECTION: forcing a failure. [ 1005.748070] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.749090] CPU: 1 PID: 9311 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1005.749606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1005.750275] Call Trace: [ 1005.750501] dump_stack+0x107/0x167 [ 1005.750807] should_fail.cold+0x5/0xa [ 1005.751126] ? __pmd_alloc+0x94/0x5e0 [ 1005.751440] should_failslab+0x5/0x20 [ 1005.751761] kmem_cache_alloc+0x5b/0x310 [ 1005.752101] __pmd_alloc+0x94/0x5e0 [ 1005.752404] handle_mm_fault+0x1ac4/0x3500 [ 1005.752760] ? perf_trace_lock+0x2bd/0x490 [ 1005.753096] ? __lockdep_reset_lock+0x180/0x180 [ 1005.753480] ? __pmd_alloc+0x5e0/0x5e0 [ 1005.753821] __get_user_pages+0x6ec/0x1620 [ 1005.754197] ? follow_page_mask+0x1900/0x1900 [ 1005.754570] ? __lockdep_reset_lock+0x180/0x180 [ 1005.754959] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1005.755338] __get_user_pages_remote+0x1d5/0x870 [ 1005.755738] ? lock_downgrade+0x6d0/0x6d0 [ 1005.756070] get_user_pages_remote+0x63/0x90 [ 1005.756445] get_arg_page+0xba/0x200 [ 1005.756741] ? acct_arg_size+0xe0/0xe0 [ 1005.757076] ? downgrade_write+0x3a0/0x3a0 [ 1005.757426] ? count.constprop.0+0x1b3/0x290 [ 1005.757798] copy_string_kernel+0x1b4/0x450 [ 1005.758168] do_execveat_common+0x525/0x8d0 [ 1005.758525] ? bprm_execve+0x1960/0x1960 [ 1005.758881] __x64_sys_execveat+0xed/0x140 [ 1005.759234] do_syscall_64+0x33/0x40 [ 1005.759543] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1005.759934] RIP: 0033:0x7f3739cfbb19 [ 1005.760241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1005.761727] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1005.762351] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1005.762930] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1005.763478] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.764164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1005.764710] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 01:22:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:22:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 01:22:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 01:22:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) [ 1019.777950] FAULT_INJECTION: forcing a failure. [ 1019.777950] name failslab, interval 1, probability 0, space 0, times 0 [ 1019.779785] CPU: 1 PID: 9439 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1019.780781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1019.782013] Call Trace: [ 1019.782413] dump_stack+0x107/0x167 [ 1019.782960] should_fail.cold+0x5/0xa [ 1019.783537] ? create_object.isra.0+0x3a/0xa20 [ 1019.784216] should_failslab+0x5/0x20 [ 1019.784784] kmem_cache_alloc+0x5b/0x310 [ 1019.785332] FAULT_INJECTION: forcing a failure. [ 1019.785332] name failslab, interval 1, probability 0, space 0, times 0 [ 1019.785421] create_object.isra.0+0x3a/0xa20 [ 1019.787658] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1019.788411] kmem_cache_alloc+0x159/0x310 [ 1019.789055] __pmd_alloc+0x94/0x5e0 [ 1019.789599] handle_mm_fault+0x1ac4/0x3500 [ 1019.790229] ? perf_trace_lock+0x2bd/0x490 [ 1019.790854] ? __lockdep_reset_lock+0x180/0x180 [ 1019.791537] ? __pmd_alloc+0x5e0/0x5e0 [ 1019.792157] __get_user_pages+0x6ec/0x1620 [ 1019.792882] ? follow_page_mask+0x1900/0x1900 [ 1019.793559] ? __lockdep_reset_lock+0x180/0x180 [ 1019.794236] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1019.794939] __get_user_pages_remote+0x1d5/0x870 [ 1019.795631] ? lock_downgrade+0x6d0/0x6d0 [ 1019.796254] get_user_pages_remote+0x63/0x90 [ 1019.796905] get_arg_page+0xba/0x200 [ 1019.797481] ? acct_arg_size+0xe0/0xe0 [ 1019.798045] ? downgrade_write+0x3a0/0x3a0 [ 1019.798663] ? count.constprop.0+0x1b3/0x290 [ 1019.799315] copy_string_kernel+0x1b4/0x450 [ 1019.799959] do_execveat_common+0x525/0x8d0 [ 1019.800591] ? bprm_execve+0x1960/0x1960 [ 1019.801237] __x64_sys_execveat+0xed/0x140 [ 1019.801863] do_syscall_64+0x33/0x40 [ 1019.802409] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1019.803149] RIP: 0033:0x7fa50365eb19 [ 1019.803689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1019.806321] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1019.807419] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1019.808540] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1019.809592] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1019.810624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1019.811648] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1019.812725] CPU: 0 PID: 9433 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1019.813727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1019.814911] Call Trace: [ 1019.815307] dump_stack+0x107/0x167 [ 1019.815849] should_fail.cold+0x5/0xa [ 1019.816408] ? create_object.isra.0+0x3a/0xa20 [ 1019.817087] should_failslab+0x5/0x20 [ 1019.817644] kmem_cache_alloc+0x5b/0x310 [ 1019.818247] create_object.isra.0+0x3a/0xa20 [ 1019.818884] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1019.819639] kmem_cache_alloc+0x159/0x310 [ 1019.820254] __pmd_alloc+0x94/0x5e0 [ 1019.820799] handle_mm_fault+0x1ac4/0x3500 [ 1019.821438] ? perf_trace_lock+0x2bd/0x490 [ 1019.822056] ? __lockdep_reset_lock+0x180/0x180 [ 1019.822735] ? __pmd_alloc+0x5e0/0x5e0 [ 1019.823347] __get_user_pages+0x6ec/0x1620 [ 1019.824021] ? follow_page_mask+0x1900/0x1900 [ 1019.824676] ? __lockdep_reset_lock+0x180/0x180 [ 1019.825362] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1019.826070] __get_user_pages_remote+0x1d5/0x870 [ 1019.826766] ? lock_downgrade+0x6d0/0x6d0 [ 1019.827388] get_user_pages_remote+0x63/0x90 [ 1019.828040] get_arg_page+0xba/0x200 [ 1019.828589] ? acct_arg_size+0xe0/0xe0 [ 1019.829159] ? downgrade_write+0x3a0/0x3a0 [ 1019.829785] ? count.constprop.0+0x1b3/0x290 [ 1019.830444] copy_string_kernel+0x1b4/0x450 [ 1019.831094] do_execveat_common+0x525/0x8d0 [ 1019.831731] ? bprm_execve+0x1960/0x1960 [ 1019.832354] __x64_sys_execveat+0xed/0x140 [ 1019.832988] do_syscall_64+0x33/0x40 [ 1019.833537] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1019.834273] RIP: 0033:0x7f3739cfbb19 [ 1019.834818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1019.837445] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1019.838543] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1019.839569] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1019.840600] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1019.841625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1019.842652] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1019.843868] hpet: Lost 1 RTC interrupts 01:22:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000070000000000"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1019.868726] FAULT_INJECTION: forcing a failure. [ 1019.868726] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1019.870874] CPU: 0 PID: 9443 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 1019.871878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1019.873119] Call Trace: [ 1019.873532] dump_stack+0x107/0x167 [ 1019.874093] should_fail.cold+0x5/0xa [ 1019.874675] __alloc_pages_nodemask+0x182/0x600 [ 1019.875362] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1019.876232] ? find_held_lock+0x2c/0x110 [ 1019.876840] ? __pmd_alloc+0x2db/0x5e0 [ 1019.877421] ? lock_downgrade+0x6d0/0x6d0 [ 1019.878025] ? do_raw_spin_lock+0x121/0x260 [ 1019.878676] alloc_pages_current+0x187/0x280 [ 1019.879338] pte_alloc_one+0x16/0x1a0 [ 1019.879904] __pte_alloc+0x1d/0x330 [ 1019.880449] handle_mm_fault+0x287f/0x3500 [ 1019.881083] ? perf_trace_lock+0x2bd/0x490 [ 1019.881708] ? __lockdep_reset_lock+0x180/0x180 [ 1019.882397] ? __pmd_alloc+0x5e0/0x5e0 [ 1019.883022] __get_user_pages+0x6ec/0x1620 [ 1019.883667] ? follow_page_mask+0x1900/0x1900 [ 1019.884328] ? __lockdep_reset_lock+0x180/0x180 [ 1019.885011] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1019.885722] __get_user_pages_remote+0x1d5/0x870 [ 1019.886456] ? lock_downgrade+0x6d0/0x6d0 [ 1019.887079] get_user_pages_remote+0x63/0x90 [ 1019.887733] get_arg_page+0xba/0x200 [ 1019.888286] ? acct_arg_size+0xe0/0xe0 [ 1019.888851] ? downgrade_write+0x3a0/0x3a0 [ 1019.889486] ? count.constprop.0+0x1b3/0x290 [ 1019.890144] copy_string_kernel+0x1b4/0x450 [ 1019.890793] do_execveat_common+0x525/0x8d0 [ 1019.891432] ? bprm_execve+0x1960/0x1960 [ 1019.892055] __x64_sys_execveat+0xed/0x140 [ 1019.892682] do_syscall_64+0x33/0x40 [ 1019.893253] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1019.893997] RIP: 0033:0x7ff1f507cb19 [ 1019.894537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1019.897162] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1019.898262] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 1019.899290] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1019.900324] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1019.901361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1019.902384] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 [ 1019.903592] hpet: Lost 1 RTC interrupts 01:22:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000070000000000"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:22:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 01:22:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 01:22:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 01:22:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) [ 1020.189765] FAULT_INJECTION: forcing a failure. [ 1020.189765] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1020.191694] CPU: 1 PID: 9592 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1020.192694] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1020.193917] Call Trace: [ 1020.194316] dump_stack+0x107/0x167 [ 1020.194861] should_fail.cold+0x5/0xa [ 1020.195431] __alloc_pages_nodemask+0x182/0x600 [ 1020.196124] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1020.197022] ? find_held_lock+0x2c/0x110 [ 1020.197637] ? __pmd_alloc+0x2db/0x5e0 [ 1020.198212] ? lock_downgrade+0x6d0/0x6d0 [ 1020.198896] ? do_raw_spin_lock+0x121/0x260 [ 1020.199476] FAULT_INJECTION: forcing a failure. [ 1020.199476] name failslab, interval 1, probability 0, space 0, times 0 [ 1020.199539] alloc_pages_current+0x187/0x280 [ 1020.201778] pte_alloc_one+0x16/0x1a0 [ 1020.202338] __pte_alloc+0x1d/0x330 [ 1020.202884] handle_mm_fault+0x287f/0x3500 [ 1020.203510] ? perf_trace_lock+0x2bd/0x490 [ 1020.204131] ? __lockdep_reset_lock+0x180/0x180 [ 1020.204812] ? __pmd_alloc+0x5e0/0x5e0 [ 1020.205453] __get_user_pages+0x6ec/0x1620 [ 1020.206104] ? follow_page_mask+0x1900/0x1900 [ 1020.206760] ? __lockdep_reset_lock+0x180/0x180 [ 1020.207437] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1020.208147] __get_user_pages_remote+0x1d5/0x870 [ 1020.208847] ? lock_downgrade+0x6d0/0x6d0 [ 1020.209488] get_user_pages_remote+0x63/0x90 [ 1020.210142] get_arg_page+0xba/0x200 [ 1020.210690] ? acct_arg_size+0xe0/0xe0 [ 1020.211254] ? downgrade_write+0x3a0/0x3a0 [ 1020.211871] ? count.constprop.0+0x1b3/0x290 [ 1020.212520] copy_string_kernel+0x1b4/0x450 [ 1020.213191] do_execveat_common+0x525/0x8d0 [ 1020.213827] ? bprm_execve+0x1960/0x1960 [ 1020.214483] __x64_sys_execveat+0xed/0x140 [ 1020.215131] do_syscall_64+0x33/0x40 [ 1020.215679] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1020.216424] RIP: 0033:0x7fa50365eb19 [ 1020.216977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1020.219645] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1020.220746] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1020.221805] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1020.222839] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1020.223884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1020.224915] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1020.226013] CPU: 0 PID: 9596 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 1020.227029] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1020.228234] Call Trace: [ 1020.228637] dump_stack+0x107/0x167 [ 1020.229202] should_fail.cold+0x5/0xa [ 1020.229776] ? ptlock_alloc+0x1d/0x70 [ 1020.230383] should_failslab+0x5/0x20 [ 1020.230947] kmem_cache_alloc+0x5b/0x310 [ 1020.231561] ptlock_alloc+0x1d/0x70 [ 1020.232105] pte_alloc_one+0x68/0x1a0 [ 1020.232675] __pte_alloc+0x1d/0x330 [ 1020.233246] handle_mm_fault+0x287f/0x3500 [ 1020.233878] ? perf_trace_lock+0x2bd/0x490 [ 1020.234504] ? __lockdep_reset_lock+0x180/0x180 [ 1020.235190] ? __pmd_alloc+0x5e0/0x5e0 [ 1020.235814] __get_user_pages+0x6ec/0x1620 [ 1020.236468] ? follow_page_mask+0x1900/0x1900 [ 1020.237141] ? __lockdep_reset_lock+0x180/0x180 [ 1020.237829] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1020.238548] __get_user_pages_remote+0x1d5/0x870 [ 1020.239250] ? lock_downgrade+0x6d0/0x6d0 [ 1020.239878] get_user_pages_remote+0x63/0x90 [ 1020.240539] get_arg_page+0xba/0x200 [ 1020.241101] ? acct_arg_size+0xe0/0xe0 [ 1020.241671] ? downgrade_write+0x3a0/0x3a0 [ 1020.242296] ? count.constprop.0+0x1b3/0x290 [ 1020.242358] FAULT_INJECTION: forcing a failure. [ 1020.242358] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1020.242950] copy_string_kernel+0x1b4/0x450 [ 1020.242994] do_execveat_common+0x525/0x8d0 [ 1020.245895] ? bprm_execve+0x1960/0x1960 [ 1020.246531] __x64_sys_execveat+0xed/0x140 [ 1020.247164] do_syscall_64+0x33/0x40 [ 1020.247716] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1020.248464] RIP: 0033:0x7ff1f507cb19 [ 1020.249020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1020.251643] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1020.252751] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 1020.253787] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1020.254813] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1020.255844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1020.256873] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 [ 1020.257958] CPU: 1 PID: 9613 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1020.258116] hpet: Lost 1 RTC interrupts [ 1020.259004] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1020.261049] Call Trace: [ 1020.261553] dump_stack+0x107/0x167 [ 1020.262092] should_fail.cold+0x5/0xa [ 1020.262661] __alloc_pages_nodemask+0x182/0x600 [ 1020.263344] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1020.264209] ? find_held_lock+0x2c/0x110 [ 1020.264812] ? __pmd_alloc+0x2db/0x5e0 [ 1020.265419] ? lock_downgrade+0x6d0/0x6d0 [ 1020.266028] ? do_raw_spin_lock+0x121/0x260 [ 1020.266670] alloc_pages_current+0x187/0x280 [ 1020.267336] pte_alloc_one+0x16/0x1a0 [ 1020.267894] __pte_alloc+0x1d/0x330 [ 1020.268441] handle_mm_fault+0x287f/0x3500 [ 1020.269088] ? perf_trace_lock+0x2bd/0x490 [ 1020.269713] ? __lockdep_reset_lock+0x180/0x180 [ 1020.270422] ? __pmd_alloc+0x5e0/0x5e0 [ 1020.271041] __get_user_pages+0x6ec/0x1620 [ 1020.271685] ? follow_page_mask+0x1900/0x1900 [ 1020.272342] ? __lockdep_reset_lock+0x180/0x180 [ 1020.273039] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1020.273750] __get_user_pages_remote+0x1d5/0x870 [ 1020.274454] ? lock_downgrade+0x6d0/0x6d0 [ 1020.275081] get_user_pages_remote+0x63/0x90 [ 1020.275737] get_arg_page+0xba/0x200 [ 1020.276292] ? acct_arg_size+0xe0/0xe0 [ 1020.276861] ? downgrade_write+0x3a0/0x3a0 [ 1020.277640] ? count.constprop.0+0x1b3/0x290 [ 1020.278295] copy_string_kernel+0x1b4/0x450 [ 1020.278957] do_execveat_common+0x525/0x8d0 [ 1020.279593] ? bprm_execve+0x1960/0x1960 [ 1020.280219] __x64_sys_execveat+0xed/0x140 [ 1020.280850] do_syscall_64+0x33/0x40 [ 1020.281426] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1020.282169] RIP: 0033:0x7f3739cfbb19 [ 1020.282710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1020.285343] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1020.286451] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1020.287482] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1020.288515] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1020.289577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1020.290610] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 01:22:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000070000000000"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:22:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) [ 1034.399165] FAULT_INJECTION: forcing a failure. [ 1034.399165] name failslab, interval 1, probability 0, space 0, times 0 [ 1034.400552] CPU: 1 PID: 9689 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1034.401122] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.401778] Call Trace: [ 1034.401997] dump_stack+0x107/0x167 [ 1034.402296] should_fail.cold+0x5/0xa [ 1034.402608] ? ptlock_alloc+0x1d/0x70 [ 1034.402925] should_failslab+0x5/0x20 [ 1034.403229] kmem_cache_alloc+0x5b/0x310 [ 1034.403562] ptlock_alloc+0x1d/0x70 [ 1034.403860] pte_alloc_one+0x68/0x1a0 [ 1034.404173] __pte_alloc+0x1d/0x330 [ 1034.404476] handle_mm_fault+0x287f/0x3500 [ 1034.404830] ? perf_trace_lock+0x2bd/0x490 [ 1034.405184] ? __lockdep_reset_lock+0x180/0x180 [ 1034.405562] ? __pmd_alloc+0x5e0/0x5e0 [ 1034.405912] __get_user_pages+0x6ec/0x1620 [ 1034.406269] ? follow_page_mask+0x1900/0x1900 [ 1034.406633] ? __lockdep_reset_lock+0x180/0x180 [ 1034.407016] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1034.407421] __get_user_pages_remote+0x1d5/0x870 [ 1034.407810] ? lock_downgrade+0x6d0/0x6d0 [ 1034.408150] get_user_pages_remote+0x63/0x90 [ 1034.408515] get_arg_page+0xba/0x200 01:22:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) [ 1034.408819] ? acct_arg_size+0xe0/0xe0 [ 1034.409321] ? downgrade_write+0x3a0/0x3a0 [ 1034.409744] ? count.constprop.0+0x1b3/0x290 [ 1034.410100] copy_string_kernel+0x1b4/0x450 [ 1034.410456] do_execveat_common+0x525/0x8d0 [ 1034.410806] ? bprm_execve+0x1960/0x1960 [ 1034.411156] __x64_sys_execveat+0xed/0x140 [ 1034.411503] do_syscall_64+0x33/0x40 [ 1034.411802] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1034.412218] RIP: 0033:0x7f3739cfbb19 [ 1034.412517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.413989] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1034.414596] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1034.415160] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1034.415721] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1034.416280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1034.416843] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1034.443380] FAULT_INJECTION: forcing a failure. [ 1034.443380] name failslab, interval 1, probability 0, space 0, times 0 01:22:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1034.444390] CPU: 1 PID: 9700 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1034.444953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.445609] Call Trace: [ 1034.445827] dump_stack+0x107/0x167 [ 1034.446114] should_fail.cold+0x5/0xa [ 1034.446418] ? ptlock_alloc+0x1d/0x70 [ 1034.446718] should_failslab+0x5/0x20 [ 1034.447021] kmem_cache_alloc+0x5b/0x310 [ 1034.447352] ptlock_alloc+0x1d/0x70 [ 1034.447642] pte_alloc_one+0x68/0x1a0 [ 1034.447949] __pte_alloc+0x1d/0x330 [ 1034.448252] handle_mm_fault+0x287f/0x3500 [ 1034.448586] ? perf_trace_lock+0x2bd/0x490 [ 1034.448926] ? __lockdep_reset_lock+0x180/0x180 [ 1034.449320] ? __pmd_alloc+0x5e0/0x5e0 [ 1034.449651] __get_user_pages+0x6ec/0x1620 [ 1034.450000] ? follow_page_mask+0x1900/0x1900 [ 1034.450359] ? __lockdep_reset_lock+0x180/0x180 [ 1034.450741] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1034.451140] __get_user_pages_remote+0x1d5/0x870 [ 1034.451529] ? lock_downgrade+0x6d0/0x6d0 [ 1034.451876] get_user_pages_remote+0x63/0x90 [ 1034.452246] get_arg_page+0xba/0x200 [ 1034.452555] ? acct_arg_size+0xe0/0xe0 [ 1034.452873] ? downgrade_write+0x3a0/0x3a0 [ 1034.453237] ? count.constprop.0+0x1b3/0x290 [ 1034.453603] copy_string_kernel+0x1b4/0x450 [ 1034.453968] do_execveat_common+0x525/0x8d0 01:22:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) 01:22:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 01:22:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1034.454328] ? bprm_execve+0x1960/0x1960 [ 1034.454843] __x64_sys_execveat+0xed/0x140 [ 1034.455213] do_syscall_64+0x33/0x40 [ 1034.455520] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1034.455935] RIP: 0033:0x7fa50365eb19 [ 1034.456238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.457795] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1034.458414] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1034.458995] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1034.459572] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1034.460153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1034.460727] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1034.469334] FAULT_INJECTION: forcing a failure. [ 1034.469334] name failslab, interval 1, probability 0, space 0, times 0 [ 1034.470387] CPU: 1 PID: 9704 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 1034.470969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.471665] Call Trace: [ 1034.471912] dump_stack+0x107/0x167 [ 1034.472427] should_fail.cold+0x5/0xa [ 1034.472832] ? create_object.isra.0+0x3a/0xa20 [ 1034.473308] should_failslab+0x5/0x20 [ 1034.473617] kmem_cache_alloc+0x5b/0x310 [ 1034.473948] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1034.474438] create_object.isra.0+0x3a/0xa20 [ 1034.474792] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1034.475207] kmem_cache_alloc+0x159/0x310 [ 1034.475553] ptlock_alloc+0x1d/0x70 [ 1034.475855] pte_alloc_one+0x68/0x1a0 [ 1034.476165] __pte_alloc+0x1d/0x330 [ 1034.476469] handle_mm_fault+0x287f/0x3500 [ 1034.476819] ? perf_trace_lock+0x2bd/0x490 [ 1034.477185] ? __lockdep_reset_lock+0x180/0x180 [ 1034.477565] ? __pmd_alloc+0x5e0/0x5e0 [ 1034.477909] __get_user_pages+0x6ec/0x1620 [ 1034.478264] ? follow_page_mask+0x1900/0x1900 [ 1034.478634] ? __lockdep_reset_lock+0x180/0x180 [ 1034.479014] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1034.479411] __get_user_pages_remote+0x1d5/0x870 [ 1034.479800] ? lock_downgrade+0x6d0/0x6d0 [ 1034.480151] get_user_pages_remote+0x63/0x90 [ 1034.480519] get_arg_page+0xba/0x200 [ 1034.480843] ? acct_arg_size+0xe0/0xe0 [ 1034.481190] ? downgrade_write+0x3a0/0x3a0 [ 1034.481556] ? count.constprop.0+0x1b3/0x290 [ 1034.481932] copy_string_kernel+0x1b4/0x450 [ 1034.482294] do_execveat_common+0x525/0x8d0 [ 1034.482649] ? bprm_execve+0x1960/0x1960 [ 1034.482996] __x64_sys_execveat+0xed/0x140 [ 1034.483341] do_syscall_64+0x33/0x40 [ 1034.483647] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1034.484064] RIP: 0033:0x7ff1f507cb19 [ 1034.484366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.485848] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1034.486459] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 1034.487033] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1034.487612] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1034.488188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1034.488841] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 01:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 01:22:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 01:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) 01:22:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) 01:22:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1049.003057] FAULT_INJECTION: forcing a failure. [ 1049.003057] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.004800] CPU: 0 PID: 9824 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 1049.005795] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.006980] Call Trace: [ 1049.007371] dump_stack+0x107/0x167 [ 1049.007905] should_fail.cold+0x5/0xa [ 1049.008466] ? __anon_vma_prepare+0x62/0x500 [ 1049.009111] should_failslab+0x5/0x20 [ 1049.009710] kmem_cache_alloc+0x5b/0x310 [ 1049.010315] __anon_vma_prepare+0x62/0x500 [ 1049.010924] ? __pte_alloc+0x194/0x330 [ 1049.011500] handle_mm_fault+0x2b2d/0x3500 [ 1049.012128] ? perf_trace_lock+0x2bd/0x490 [ 1049.012751] ? __lockdep_reset_lock+0x180/0x180 [ 1049.013437] ? __pmd_alloc+0x5e0/0x5e0 [ 1049.014050] __get_user_pages+0x6ec/0x1620 [ 1049.014687] ? follow_page_mask+0x1900/0x1900 [ 1049.015348] ? __lockdep_reset_lock+0x180/0x180 [ 1049.016015] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1049.016718] __get_user_pages_remote+0x1d5/0x870 [ 1049.017417] ? lock_downgrade+0x6d0/0x6d0 [ 1049.018033] get_user_pages_remote+0x63/0x90 [ 1049.018689] get_arg_page+0xba/0x200 [ 1049.019238] ? acct_arg_size+0xe0/0xe0 [ 1049.019809] ? downgrade_write+0x3a0/0x3a0 [ 1049.020427] ? count.constprop.0+0x1b3/0x290 [ 1049.021074] copy_string_kernel+0x1b4/0x450 [ 1049.021740] do_execveat_common+0x525/0x8d0 [ 1049.022384] ? bprm_execve+0x1960/0x1960 [ 1049.023008] __x64_sys_execveat+0xed/0x140 [ 1049.023641] do_syscall_64+0x33/0x40 [ 1049.024185] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1049.024922] RIP: 0033:0x7ff1f507cb19 [ 1049.025009] FAULT_INJECTION: forcing a failure. [ 1049.025009] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.025465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.025490] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1049.030801] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 1049.031820] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1049.032838] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.033861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1049.034878] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 [ 1049.035946] CPU: 1 PID: 9826 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1049.036120] hpet: Lost 1 RTC interrupts [ 1049.036991] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.038735] Call Trace: [ 1049.039132] dump_stack+0x107/0x167 [ 1049.039668] should_fail.cold+0x5/0xa [ 1049.040224] ? create_object.isra.0+0x3a/0xa20 [ 1049.040986] should_failslab+0x5/0x20 [ 1049.041575] kmem_cache_alloc+0x5b/0x310 [ 1049.042168] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1049.043031] create_object.isra.0+0x3a/0xa20 [ 1049.043673] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1049.044418] kmem_cache_alloc+0x159/0x310 [ 1049.045038] ptlock_alloc+0x1d/0x70 [ 1049.045605] pte_alloc_one+0x68/0x1a0 [ 1049.046158] __pte_alloc+0x1d/0x330 [ 1049.046694] handle_mm_fault+0x287f/0x3500 [ 1049.047313] ? perf_trace_lock+0x2bd/0x490 [ 1049.047920] ? __lockdep_reset_lock+0x180/0x180 [ 1049.048586] ? __pmd_alloc+0x5e0/0x5e0 [ 1049.049202] __get_user_pages+0x6ec/0x1620 [ 1049.049854] ? follow_page_mask+0x1900/0x1900 [ 1049.050499] ? __lockdep_reset_lock+0x180/0x180 [ 1049.051166] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1049.051860] __get_user_pages_remote+0x1d5/0x870 [ 1049.052542] ? lock_downgrade+0x6d0/0x6d0 [ 1049.053148] get_user_pages_remote+0x63/0x90 [ 1049.053810] get_arg_page+0xba/0x200 [ 1049.054352] ? acct_arg_size+0xe0/0xe0 [ 1049.054907] ? downgrade_write+0x3a0/0x3a0 [ 1049.055520] ? count.constprop.0+0x1b3/0x290 [ 1049.056171] copy_string_kernel+0x1b4/0x450 [ 1049.056889] do_execveat_common+0x525/0x8d0 [ 1049.057536] ? bprm_execve+0x1960/0x1960 [ 1049.058148] __x64_sys_execveat+0xed/0x140 [ 1049.058773] do_syscall_64+0x33/0x40 [ 1049.059310] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1049.060048] RIP: 0033:0x7f3739cfbb19 [ 1049.060588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.060883] FAULT_INJECTION: forcing a failure. [ 1049.060883] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.063210] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1049.063233] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1049.063245] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1049.063256] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.063276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1049.069975] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1049.071045] CPU: 0 PID: 9834 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1049.072081] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.073278] Call Trace: [ 1049.073678] dump_stack+0x107/0x167 [ 1049.074218] should_fail.cold+0x5/0xa [ 1049.074783] ? create_object.isra.0+0x3a/0xa20 [ 1049.075455] should_failslab+0x5/0x20 [ 1049.076015] kmem_cache_alloc+0x5b/0x310 [ 1049.076609] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1049.077491] create_object.isra.0+0x3a/0xa20 [ 1049.078136] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1049.078880] kmem_cache_alloc+0x159/0x310 [ 1049.079505] ptlock_alloc+0x1d/0x70 [ 1049.080044] pte_alloc_one+0x68/0x1a0 [ 1049.080606] __pte_alloc+0x1d/0x330 [ 1049.081146] handle_mm_fault+0x287f/0x3500 [ 1049.081779] ? perf_trace_lock+0x2bd/0x490 [ 1049.082397] ? __lockdep_reset_lock+0x180/0x180 [ 1049.083078] ? __pmd_alloc+0x5e0/0x5e0 [ 1049.083699] __get_user_pages+0x6ec/0x1620 [ 1049.084340] ? follow_page_mask+0x1900/0x1900 [ 1049.085001] ? __lockdep_reset_lock+0x180/0x180 [ 1049.085681] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1049.086390] __get_user_pages_remote+0x1d5/0x870 [ 1049.087087] ? lock_downgrade+0x6d0/0x6d0 [ 1049.087706] get_user_pages_remote+0x63/0x90 [ 1049.088361] get_arg_page+0xba/0x200 [ 1049.088917] ? acct_arg_size+0xe0/0xe0 [ 1049.089491] ? downgrade_write+0x3a0/0x3a0 [ 1049.090113] ? count.constprop.0+0x1b3/0x290 [ 1049.090768] copy_string_kernel+0x1b4/0x450 [ 1049.091416] do_execveat_common+0x525/0x8d0 [ 1049.092057] ? bprm_execve+0x1960/0x1960 [ 1049.092687] __x64_sys_execveat+0xed/0x140 [ 1049.093322] do_syscall_64+0x33/0x40 [ 1049.093868] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1049.094614] RIP: 0033:0x7fa50365eb19 [ 1049.095158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.097791] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1049.098871] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1049.099907] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1049.100937] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.101972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1049.103006] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1049.104222] hpet: Lost 2 RTC interrupts 01:22:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000070000000000"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) 01:22:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1049.280645] FAULT_INJECTION: forcing a failure. [ 1049.280645] name failslab, interval 1, probability 0, space 0, times 0 01:22:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1049.282517] CPU: 1 PID: 9951 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 1049.283680] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.284893] Call Trace: [ 1049.285341] dump_stack+0x107/0x167 [ 1049.285912] should_fail.cold+0x5/0xa [ 1049.286483] ? create_object.isra.0+0x3a/0xa20 [ 1049.287152] should_failslab+0x5/0x20 [ 1049.287708] kmem_cache_alloc+0x5b/0x310 [ 1049.288317] create_object.isra.0+0x3a/0xa20 [ 1049.288955] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1049.289723] kmem_cache_alloc+0x159/0x310 [ 1049.290341] __anon_vma_prepare+0x62/0x500 [ 1049.291021] ? __pte_alloc+0x194/0x330 [ 1049.291598] handle_mm_fault+0x2b2d/0x3500 [ 1049.292222] ? perf_trace_lock+0x2bd/0x490 [ 1049.292837] ? __lockdep_reset_lock+0x180/0x180 [ 1049.293532] ? __pmd_alloc+0x5e0/0x5e0 [ 1049.294151] __get_user_pages+0x6ec/0x1620 [ 1049.294788] ? follow_page_mask+0x1900/0x1900 [ 1049.295441] ? __lockdep_reset_lock+0x180/0x180 [ 1049.296121] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1049.296830] __get_user_pages_remote+0x1d5/0x870 [ 1049.297543] ? lock_downgrade+0x6d0/0x6d0 [ 1049.298167] get_user_pages_remote+0x63/0x90 [ 1049.298820] get_arg_page+0xba/0x200 [ 1049.299370] ? acct_arg_size+0xe0/0xe0 [ 1049.299932] ? downgrade_write+0x3a0/0x3a0 [ 1049.300553] ? count.constprop.0+0x1b3/0x290 [ 1049.301220] copy_string_kernel+0x1b4/0x450 01:22:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) [ 1049.301881] do_execveat_common+0x525/0x8d0 [ 1049.302653] ? bprm_execve+0x1960/0x1960 [ 1049.303281] __x64_sys_execveat+0xed/0x140 [ 1049.303906] do_syscall_64+0x33/0x40 [ 1049.304447] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1049.305201] RIP: 0033:0x7ff1f507cb19 [ 1049.305758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.308507] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1049.309627] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 1049.310661] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1049.311690] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.312712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:22:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) [ 1049.313760] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 01:22:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) 01:22:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) [ 1049.400148] FAULT_INJECTION: forcing a failure. [ 1049.400148] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1049.402053] CPU: 0 PID: 9964 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1049.403038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.403862] FAULT_INJECTION: forcing a failure. [ 1049.403862] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.404230] Call Trace: [ 1049.406248] dump_stack+0x107/0x167 [ 1049.406785] should_fail.cold+0x5/0xa [ 1049.407356] __alloc_pages_nodemask+0x182/0x600 [ 1049.408038] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1049.408905] ? find_held_lock+0x2c/0x110 [ 1049.409514] ? __pmd_alloc+0x2db/0x5e0 [ 1049.410093] ? lock_downgrade+0x6d0/0x6d0 [ 1049.410696] ? do_raw_spin_lock+0x121/0x260 [ 1049.411334] alloc_pages_current+0x187/0x280 [ 1049.411984] pte_alloc_one+0x16/0x1a0 [ 1049.412545] __pte_alloc+0x1d/0x330 [ 1049.413085] handle_mm_fault+0x287f/0x3500 [ 1049.413711] ? perf_trace_lock+0x2bd/0x490 [ 1049.414340] ? __pmd_alloc+0x5e0/0x5e0 [ 1049.414956] __get_user_pages+0x6ec/0x1620 [ 1049.415598] ? follow_page_mask+0x1900/0x1900 [ 1049.416276] ? __lockdep_reset_lock+0x180/0x180 [ 1049.416954] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1049.417668] __get_user_pages_remote+0x1d5/0x870 [ 1049.418366] ? lock_downgrade+0x6d0/0x6d0 [ 1049.418986] get_user_pages_remote+0x63/0x90 [ 1049.419642] get_arg_page+0xba/0x200 [ 1049.420187] ? acct_arg_size+0xe0/0xe0 [ 1049.420752] ? downgrade_write+0x3a0/0x3a0 [ 1049.421381] ? count.constprop.0+0x1b3/0x290 [ 1049.422037] copy_string_kernel+0x1b4/0x450 [ 1049.422683] do_execveat_common+0x525/0x8d0 [ 1049.423323] ? bprm_execve+0x1960/0x1960 [ 1049.423951] __x64_sys_execveat+0xed/0x140 [ 1049.424580] do_syscall_64+0x33/0x40 [ 1049.425123] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1049.425872] RIP: 0033:0x7fa50365eb19 [ 1049.426421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.429042] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1049.430142] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1049.431160] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1049.432181] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.433217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1049.434240] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1049.435321] CPU: 1 PID: 9965 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1049.435470] hpet: Lost 1 RTC interrupts [ 1049.436400] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.438172] Call Trace: [ 1049.438580] dump_stack+0x107/0x167 [ 1049.439119] should_fail.cold+0x5/0xa [ 1049.439687] ? getname_flags.part.0+0x50/0x4f0 [ 1049.440363] should_failslab+0x5/0x20 [ 1049.440918] kmem_cache_alloc+0x5b/0x310 [ 1049.441544] getname_flags.part.0+0x50/0x4f0 [ 1049.442202] getname_flags+0x9a/0xe0 [ 1049.442764] __x64_sys_execveat+0xd6/0x140 [ 1049.443391] do_syscall_64+0x33/0x40 [ 1049.443938] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1049.444675] RIP: 0033:0x7f1d9af7cb19 [ 1049.445235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.448064] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1049.449172] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1049.450225] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1049.450927] FAULT_INJECTION: forcing a failure. [ 1049.450927] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.451265] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.451279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1049.451301] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1049.455982] CPU: 0 PID: 9969 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1049.456987] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.458193] Call Trace: [ 1049.458586] dump_stack+0x107/0x167 [ 1049.459131] should_fail.cold+0x5/0xa [ 1049.459696] ? __anon_vma_prepare+0x62/0x500 [ 1049.460343] should_failslab+0x5/0x20 [ 1049.460903] kmem_cache_alloc+0x5b/0x310 [ 1049.461522] __anon_vma_prepare+0x62/0x500 [ 1049.462141] ? __pte_alloc+0x194/0x330 [ 1049.462754] handle_mm_fault+0x2b2d/0x3500 [ 1049.463381] ? perf_trace_lock+0x2bd/0x490 [ 1049.464004] ? __lockdep_reset_lock+0x180/0x180 [ 1049.464702] ? __pmd_alloc+0x5e0/0x5e0 [ 1049.465329] __get_user_pages+0x6ec/0x1620 [ 1049.465975] ? follow_page_mask+0x1900/0x1900 [ 1049.466633] ? __lockdep_reset_lock+0x180/0x180 [ 1049.467314] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1049.468028] __get_user_pages_remote+0x1d5/0x870 [ 1049.468728] ? lock_downgrade+0x6d0/0x6d0 [ 1049.469358] get_user_pages_remote+0x63/0x90 [ 1049.470016] get_arg_page+0xba/0x200 [ 1049.470569] ? acct_arg_size+0xe0/0xe0 [ 1049.471140] ? downgrade_write+0x3a0/0x3a0 [ 1049.471766] ? count.constprop.0+0x1b3/0x290 [ 1049.472420] copy_string_kernel+0x1b4/0x450 [ 1049.473075] do_execveat_common+0x525/0x8d0 [ 1049.473725] ? bprm_execve+0x1960/0x1960 [ 1049.474354] __x64_sys_execveat+0xed/0x140 [ 1049.474985] do_syscall_64+0x33/0x40 [ 1049.475534] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1049.476279] RIP: 0033:0x7f3739cfbb19 [ 1049.476825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.479452] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1049.480555] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1049.481590] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1049.482614] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.483641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1049.484666] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1049.485839] hpet: Lost 1 RTC interrupts 01:22:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000070000000000"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 01:22:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000070000000000"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040000000000000000000000200000000000000000000380002"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) 01:22:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1049.632394] FAULT_INJECTION: forcing a failure. [ 1049.632394] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.634228] CPU: 0 PID: 10055 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 1049.635246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.636451] Call Trace: [ 1049.636849] dump_stack+0x107/0x167 [ 1049.637407] should_fail.cold+0x5/0xa [ 1049.637982] ? __anon_vma_prepare+0x270/0x500 [ 1049.638653] should_failslab+0x5/0x20 [ 1049.639217] kmem_cache_alloc+0x5b/0x310 [ 1049.639828] __anon_vma_prepare+0x270/0x500 [ 1049.640460] ? __pte_alloc+0x194/0x330 [ 1049.641052] handle_mm_fault+0x2b2d/0x3500 [ 1049.641701] ? perf_trace_lock+0x2bd/0x490 [ 1049.642327] ? __lockdep_reset_lock+0x180/0x180 [ 1049.643021] ? __pmd_alloc+0x5e0/0x5e0 [ 1049.643652] __get_user_pages+0x6ec/0x1620 [ 1049.644327] ? follow_page_mask+0x1900/0x1900 [ 1049.644994] ? __lockdep_reset_lock+0x180/0x180 [ 1049.645698] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1049.646418] __get_user_pages_remote+0x1d5/0x870 [ 1049.647122] ? lock_downgrade+0x6d0/0x6d0 [ 1049.647753] get_user_pages_remote+0x63/0x90 [ 1049.648418] get_arg_page+0xba/0x200 [ 1049.648980] ? acct_arg_size+0xe0/0xe0 [ 1049.649557] ? downgrade_write+0x3a0/0x3a0 [ 1049.650193] ? count.constprop.0+0x1b3/0x290 [ 1049.650860] copy_string_kernel+0x1b4/0x450 [ 1049.651515] do_execveat_common+0x525/0x8d0 [ 1049.652160] ? bprm_execve+0x1960/0x1960 [ 1049.652804] __x64_sys_execveat+0xed/0x140 [ 1049.653449] do_syscall_64+0x33/0x40 [ 1049.654005] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1049.654758] RIP: 0033:0x7ff1f507cb19 [ 1049.655313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.657976] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1049.659090] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 1049.660122] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1049.661158] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.662200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1049.663233] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 [ 1049.664420] hpet: Lost 1 RTC interrupts [ 1049.667836] FAULT_INJECTION: forcing a failure. [ 1049.667836] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.669628] CPU: 1 PID: 10080 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1049.670651] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.671837] Call Trace: [ 1049.672248] dump_stack+0x107/0x167 [ 1049.672791] should_fail.cold+0x5/0xa [ 1049.673380] ? create_object.isra.0+0x3a/0xa20 [ 1049.674059] should_failslab+0x5/0x20 [ 1049.674624] kmem_cache_alloc+0x5b/0x310 [ 1049.675333] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1049.676232] create_object.isra.0+0x3a/0xa20 [ 1049.676875] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1049.677671] kmem_cache_alloc+0x159/0x310 [ 1049.678296] ptlock_alloc+0x1d/0x70 [ 1049.678843] pte_alloc_one+0x68/0x1a0 [ 1049.679414] __pte_alloc+0x1d/0x330 01:22:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000070000000000000000"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1049.679981] handle_mm_fault+0x287f/0x3500 [ 1049.680775] ? perf_trace_lock+0x2bd/0x490 [ 1049.681430] ? __pmd_alloc+0x5e0/0x5e0 [ 1049.682048] __get_user_pages+0x6ec/0x1620 [ 1049.682694] ? follow_page_mask+0x1900/0x1900 [ 1049.683365] ? __lockdep_reset_lock+0x180/0x180 [ 1049.684050] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1049.684781] __get_user_pages_remote+0x1d5/0x870 [ 1049.685503] ? lock_downgrade+0x6d0/0x6d0 [ 1049.686136] get_user_pages_remote+0x63/0x90 [ 1049.686795] get_arg_page+0xba/0x200 [ 1049.687356] ? acct_arg_size+0xe0/0xe0 [ 1049.687923] ? downgrade_write+0x3a0/0x3a0 [ 1049.688551] ? count.constprop.0+0x1b3/0x290 [ 1049.689227] copy_string_kernel+0x1b4/0x450 [ 1049.689909] do_execveat_common+0x525/0x8d0 [ 1049.690549] ? bprm_execve+0x1960/0x1960 [ 1049.691283] __x64_sys_execveat+0xed/0x140 [ 1049.691909] do_syscall_64+0x33/0x40 [ 1049.692463] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1049.693227] RIP: 0033:0x7fa50365eb19 [ 1049.693795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.696415] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1049.697559] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1049.698589] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1049.699617] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.700654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1049.701703] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 01:22:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) 01:22:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040000000000000000000000200000000000000000000380002"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1049.843945] FAULT_INJECTION: forcing a failure. [ 1049.843945] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.845780] CPU: 0 PID: 10101 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1049.846749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.847910] Call Trace: [ 1049.848292] dump_stack+0x107/0x167 [ 1049.848811] should_fail.cold+0x5/0xa [ 1049.849378] ? ptlock_alloc+0x1d/0x70 [ 1049.849919] should_failslab+0x5/0x20 [ 1049.850454] kmem_cache_alloc+0x5b/0x310 [ 1049.851047] ptlock_alloc+0x1d/0x70 [ 1049.851562] pte_alloc_one+0x68/0x1a0 [ 1049.852108] __pte_alloc+0x1d/0x330 [ 1049.852632] handle_mm_fault+0x287f/0x3500 [ 1049.853247] ? perf_trace_lock+0x2bd/0x490 [ 1049.853851] ? __pmd_alloc+0x5e0/0x5e0 [ 1049.854454] __get_user_pages+0x6ec/0x1620 [ 1049.855072] ? follow_page_mask+0x1900/0x1900 [ 1049.855712] ? __lockdep_reset_lock+0x180/0x180 [ 1049.856364] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1049.857048] __get_user_pages_remote+0x1d5/0x870 [ 1049.857720] ? lock_downgrade+0x6d0/0x6d0 [ 1049.858328] get_user_pages_remote+0x63/0x90 [ 1049.858954] get_arg_page+0xba/0x200 [ 1049.859482] ? acct_arg_size+0xe0/0xe0 [ 1049.860022] ? downgrade_write+0x3a0/0x3a0 [ 1049.860618] ? count.constprop.0+0x1b3/0x290 [ 1049.861250] copy_string_kernel+0x1b4/0x450 [ 1049.861874] do_execveat_common+0x525/0x8d0 [ 1049.862485] ? bprm_execve+0x1960/0x1960 [ 1049.863086] __x64_sys_execveat+0xed/0x140 [ 1049.863685] do_syscall_64+0x33/0x40 [ 1049.864207] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1049.864912] RIP: 0033:0x7f3739cfbb19 [ 1049.865443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.867943] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1049.868994] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1049.869981] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1049.870965] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.871947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1049.872926] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1049.874050] hpet: Lost 1 RTC interrupts 01:22:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 01:22:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) 01:22:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 01:22:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) 01:22:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000070000000000000000"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) 01:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040000000000000000000000200000000000000000000380002"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1063.081462] FAULT_INJECTION: forcing a failure. [ 1063.081462] name failslab, interval 1, probability 0, space 0, times 0 [ 1063.082461] CPU: 0 PID: 10111 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 1063.083028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1063.083703] Call Trace: [ 1063.083944] dump_stack+0x107/0x167 [ 1063.084260] should_fail.cold+0x5/0xa [ 1063.084598] ? create_object.isra.0+0x3a/0xa20 [ 1063.084996] should_failslab+0x5/0x20 [ 1063.085339] kmem_cache_alloc+0x5b/0x310 [ 1063.085687] create_object.isra.0+0x3a/0xa20 [ 1063.086049] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1063.086495] kmem_cache_alloc+0x159/0x310 [ 1063.086866] __anon_vma_prepare+0x270/0x500 [ 1063.087247] handle_mm_fault+0x2b2d/0x3500 [ 1063.087611] ? perf_trace_lock+0x2bd/0x490 [ 1063.087965] ? __lockdep_reset_lock+0x180/0x180 [ 1063.088352] ? __pmd_alloc+0x5e0/0x5e0 [ 1063.088716] __get_user_pages+0x6ec/0x1620 [ 1063.089080] ? follow_page_mask+0x1900/0x1900 [ 1063.089461] ? __lockdep_reset_lock+0x180/0x180 [ 1063.089852] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1063.090256] __get_user_pages_remote+0x1d5/0x870 [ 1063.090653] ? lock_downgrade+0x6d0/0x6d0 [ 1063.091011] get_user_pages_remote+0x63/0x90 [ 1063.091387] get_arg_page+0xba/0x200 [ 1063.091701] ? acct_arg_size+0xe0/0xe0 [ 1063.092027] ? downgrade_write+0x3a0/0x3a0 [ 1063.092382] ? count.constprop.0+0x1b3/0x290 [ 1063.092758] copy_string_kernel+0x1b4/0x450 [ 1063.093130] do_execveat_common+0x525/0x8d0 [ 1063.093499] ? bprm_execve+0x1960/0x1960 [ 1063.093857] __x64_sys_execveat+0xed/0x140 [ 1063.094217] do_syscall_64+0x33/0x40 [ 1063.094529] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1063.094955] RIP: 0033:0x7ff1f507cb19 [ 1063.095289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1063.096777] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1063.097414] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 1063.098004] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1063.098590] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1063.099172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1063.099756] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 [ 1063.108514] FAULT_INJECTION: forcing a failure. [ 1063.108514] name failslab, interval 1, probability 0, space 0, times 0 [ 1063.109522] CPU: 0 PID: 10124 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1063.110085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1063.110781] Call Trace: [ 1063.111000] dump_stack+0x107/0x167 [ 1063.111305] should_fail.cold+0x5/0xa [ 1063.111618] ? create_object.isra.0+0x3a/0xa20 [ 1063.111994] should_failslab+0x5/0x20 [ 1063.112309] kmem_cache_alloc+0x5b/0x310 [ 1063.112649] create_object.isra.0+0x3a/0xa20 [ 1063.113010] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1063.113440] kmem_cache_alloc+0x159/0x310 [ 1063.113790] getname_flags.part.0+0x50/0x4f0 [ 1063.114158] getname_flags+0x9a/0xe0 [ 1063.114471] __x64_sys_execveat+0xd6/0x140 [ 1063.114824] do_syscall_64+0x33/0x40 [ 1063.115129] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1063.115548] RIP: 0033:0x7f1d9af7cb19 [ 1063.115852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1063.117342] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1063.117964] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1063.118544] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1063.119124] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1063.119702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1063.120275] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1063.120943] FAULT_INJECTION: forcing a failure. [ 1063.120943] name failslab, interval 1, probability 0, space 0, times 0 [ 1063.122803] CPU: 1 PID: 10112 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1063.123922] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1063.125238] Call Trace: [ 1063.125684] dump_stack+0x107/0x167 [ 1063.126352] should_fail.cold+0x5/0xa [ 1063.126978] ? __anon_vma_prepare+0x270/0x500 [ 1063.127708] should_failslab+0x5/0x20 [ 1063.128327] kmem_cache_alloc+0x5b/0x310 [ 1063.129006] __anon_vma_prepare+0x270/0x500 [ 1063.129701] ? __pte_alloc+0x194/0x330 01:22:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000070000000000000000"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1063.130348] handle_mm_fault+0x2b2d/0x3500 [ 1063.131170] ? perf_trace_lock+0x2bd/0x490 [ 1063.131862] ? __lockdep_reset_lock+0x180/0x180 [ 1063.132606] ? __pmd_alloc+0x5e0/0x5e0 [ 1063.133284] __get_user_pages+0x6ec/0x1620 [ 1063.134004] ? follow_page_mask+0x1900/0x1900 [ 1063.134731] ? __lockdep_reset_lock+0x180/0x180 [ 1063.135481] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1063.136255] __get_user_pages_remote+0x1d5/0x870 [ 1063.137022] ? lock_downgrade+0x6d0/0x6d0 [ 1063.137716] get_user_pages_remote+0x63/0x90 [ 1063.138440] get_arg_page+0xba/0x200 [ 1063.139049] ? acct_arg_size+0xe0/0xe0 [ 1063.139675] ? downgrade_write+0x3a0/0x3a0 [ 1063.140362] ? count.constprop.0+0x1b3/0x290 [ 1063.141081] copy_string_kernel+0x1b4/0x450 [ 1063.141799] do_execveat_common+0x525/0x8d0 [ 1063.142555] ? bprm_execve+0x1960/0x1960 [ 1063.143249] __x64_sys_execveat+0xed/0x140 [ 1063.143945] do_syscall_64+0x33/0x40 [ 1063.144538] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1063.145366] RIP: 0033:0x7f3739cfbb19 [ 1063.145964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1063.148861] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 01:22:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000000038000200000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1063.150077] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1063.151269] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1063.152391] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1063.153535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1063.154636] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1063.163821] FAULT_INJECTION: forcing a failure. [ 1063.163821] name failslab, interval 1, probability 0, space 0, times 0 [ 1063.165619] CPU: 1 PID: 10126 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1063.166689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1063.167968] Call Trace: [ 1063.168390] dump_stack+0x107/0x167 [ 1063.168969] should_fail.cold+0x5/0xa [ 1063.169573] ? __anon_vma_prepare+0x270/0x500 [ 1063.170285] should_failslab+0x5/0x20 [ 1063.170880] kmem_cache_alloc+0x5b/0x310 [ 1063.171535] __anon_vma_prepare+0x270/0x500 [ 1063.172205] ? __pte_alloc+0x194/0x330 [ 1063.172826] handle_mm_fault+0x2b2d/0x3500 [ 1063.173547] ? perf_trace_lock+0x2bd/0x490 [ 1063.174215] ? __lockdep_reset_lock+0x180/0x180 [ 1063.174935] ? __pmd_alloc+0x5e0/0x5e0 [ 1063.175599] __get_user_pages+0x6ec/0x1620 [ 1063.176279] ? follow_page_mask+0x1900/0x1900 [ 1063.176989] ? __lockdep_reset_lock+0x180/0x180 [ 1063.177710] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1063.178475] __get_user_pages_remote+0x1d5/0x870 [ 1063.179229] ? lock_downgrade+0x6d0/0x6d0 [ 1063.179896] get_user_pages_remote+0x63/0x90 [ 1063.180593] get_arg_page+0xba/0x200 [ 1063.181189] ? acct_arg_size+0xe0/0xe0 [ 1063.181795] ? downgrade_write+0x3a0/0x3a0 [ 1063.182463] ? count.constprop.0+0x1b3/0x290 [ 1063.183165] copy_string_kernel+0x1b4/0x450 [ 1063.183870] do_execveat_common+0x525/0x8d0 [ 1063.184555] ? bprm_execve+0x1960/0x1960 [ 1063.185230] __x64_sys_execveat+0xed/0x140 [ 1063.185904] do_syscall_64+0x33/0x40 [ 1063.186483] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1063.187279] RIP: 0033:0x7fa50365eb19 [ 1063.187861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1063.190707] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1063.191885] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1063.192968] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1063.194055] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1063.195139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1063.196228] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 01:22:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000000038000200000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) 01:22:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000000700000000000000000300"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) 01:22:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) [ 1063.323998] FAULT_INJECTION: forcing a failure. [ 1063.323998] name failslab, interval 1, probability 0, space 0, times 0 [ 1063.325024] CPU: 0 PID: 10244 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1063.325579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1063.326235] Call Trace: [ 1063.326454] dump_stack+0x107/0x167 [ 1063.326750] should_fail.cold+0x5/0xa [ 1063.327059] ? create_object.isra.0+0x3a/0xa20 [ 1063.327429] should_failslab+0x5/0x20 [ 1063.327736] kmem_cache_alloc+0x5b/0x310 [ 1063.328069] create_object.isra.0+0x3a/0xa20 [ 1063.328423] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1063.328832] kmem_cache_alloc+0x159/0x310 [ 1063.329176] __anon_vma_prepare+0x270/0x500 [ 1063.329552] ? __pte_alloc+0x194/0x330 [ 1063.329870] handle_mm_fault+0x2b2d/0x3500 [ 1063.330212] ? perf_trace_lock+0x2bd/0x490 [ 1063.330557] ? __lockdep_reset_lock+0x180/0x180 [ 1063.330929] ? __pmd_alloc+0x5e0/0x5e0 [ 1063.331274] __get_user_pages+0x6ec/0x1620 [ 1063.331628] ? follow_page_mask+0x1900/0x1900 [ 1063.331987] ? __lockdep_reset_lock+0x180/0x180 [ 1063.332357] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1063.332744] __get_user_pages_remote+0x1d5/0x870 [ 1063.333123] ? lock_downgrade+0x6d0/0x6d0 [ 1063.333468] get_user_pages_remote+0x63/0x90 [ 1063.333824] get_arg_page+0xba/0x200 [ 1063.334126] ? acct_arg_size+0xe0/0xe0 [ 1063.334440] ? downgrade_write+0x3a0/0x3a0 [ 1063.334782] ? count.constprop.0+0x1b3/0x290 [ 1063.335140] copy_string_kernel+0x1b4/0x450 [ 1063.335499] do_execveat_common+0x525/0x8d0 [ 1063.335847] ? bprm_execve+0x1960/0x1960 [ 1063.335897] FAULT_INJECTION: forcing a failure. [ 1063.335897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1063.336192] __x64_sys_execveat+0xed/0x140 [ 1063.338309] do_syscall_64+0x33/0x40 [ 1063.338615] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1063.339024] RIP: 0033:0x7f3739cfbb19 [ 1063.339328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1063.340804] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1063.341424] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1063.341999] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1063.342570] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1063.343140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1063.343719] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1063.344326] CPU: 1 PID: 10247 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1063.345499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1063.346781] Call Trace: [ 1063.347203] dump_stack+0x107/0x167 [ 1063.347673] FAULT_INJECTION: forcing a failure. [ 1063.347673] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1063.347782] should_fail.cold+0x5/0xa [ 1063.349270] strncpy_from_user+0x34/0x470 [ 1063.349936] getname_flags.part.0+0x95/0x4f0 [ 1063.350638] getname_flags+0x9a/0xe0 [ 1063.351228] __x64_sys_execveat+0xd6/0x140 [ 1063.351891] do_syscall_64+0x33/0x40 [ 1063.352470] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1063.353258] RIP: 0033:0x7f1d9af7cb19 [ 1063.353842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1063.356635] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1063.357809] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1063.358903] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1063.359998] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1063.361144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1063.362239] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1063.363376] CPU: 0 PID: 10248 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 1063.363924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1063.364571] Call Trace: [ 1063.364783] dump_stack+0x107/0x167 [ 1063.365075] should_fail.cold+0x5/0xa [ 1063.365387] __alloc_pages_nodemask+0x182/0x600 [ 1063.365762] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1063.366233] ? up_write+0x191/0x550 [ 1063.366530] ? rwlock_bug.part.0+0x90/0x90 [ 1063.366873] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1063.367309] alloc_pages_vma+0xbb/0x410 [ 1063.367636] handle_mm_fault+0x152f/0x3500 [ 1063.367978] ? perf_trace_lock+0x2bd/0x490 [ 1063.368321] ? __lockdep_reset_lock+0x180/0x180 [ 1063.368689] ? __pmd_alloc+0x5e0/0x5e0 [ 1063.369030] __get_user_pages+0x6ec/0x1620 [ 1063.369383] ? follow_page_mask+0x1900/0x1900 [ 1063.369743] ? __lockdep_reset_lock+0x180/0x180 [ 1063.370113] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1063.370499] __get_user_pages_remote+0x1d5/0x870 [ 1063.370881] ? lock_downgrade+0x6d0/0x6d0 [ 1063.371220] get_user_pages_remote+0x63/0x90 [ 1063.371576] get_arg_page+0xba/0x200 [ 1063.371882] ? acct_arg_size+0xe0/0xe0 [ 1063.372207] ? downgrade_write+0x3a0/0x3a0 [ 1063.372553] ? count.constprop.0+0x1b3/0x290 [ 1063.372914] copy_string_kernel+0x1b4/0x450 [ 1063.373271] do_execveat_common+0x525/0x8d0 [ 1063.373634] ? bprm_execve+0x1960/0x1960 [ 1063.373987] __x64_sys_execveat+0xed/0x140 [ 1063.374336] do_syscall_64+0x33/0x40 [ 1063.374653] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1063.375056] RIP: 0033:0x7ff1f507cb19 [ 1063.375359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1063.376845] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1063.377466] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 1063.378033] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1063.378598] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1063.379165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1063.379732] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 01:22:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) 01:22:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) 01:22:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000000700000000000000000300"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) 01:22:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000000038000200000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 01:22:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) [ 1076.734992] FAULT_INJECTION: forcing a failure. [ 1076.734992] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1076.736196] CPU: 1 PID: 10265 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1076.736870] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1076.737732] Call Trace: [ 1076.737999] dump_stack+0x107/0x167 [ 1076.738363] should_fail.cold+0x5/0xa [ 1076.738743] __alloc_pages_nodemask+0x182/0x600 [ 1076.739202] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1076.739783] ? up_write+0x191/0x550 [ 1076.740141] ? rwlock_bug.part.0+0x90/0x90 [ 1076.740558] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1076.741090] alloc_pages_vma+0xbb/0x410 [ 1076.741492] handle_mm_fault+0x152f/0x3500 [ 1076.741914] ? perf_trace_lock+0x2bd/0x490 [ 1076.742326] ? __lockdep_reset_lock+0x180/0x180 [ 1076.742776] ? __pmd_alloc+0x5e0/0x5e0 [ 1076.743186] __get_user_pages+0x6ec/0x1620 [ 1076.743614] ? follow_page_mask+0x1900/0x1900 [ 1076.744050] ? __lockdep_reset_lock+0x180/0x180 [ 1076.744501] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1076.744972] __get_user_pages_remote+0x1d5/0x870 [ 1076.745445] ? lock_downgrade+0x6d0/0x6d0 [ 1076.745854] get_user_pages_remote+0x63/0x90 [ 1076.746292] get_arg_page+0xba/0x200 [ 1076.746660] ? acct_arg_size+0xe0/0xe0 [ 1076.747036] ? downgrade_write+0x3a0/0x3a0 [ 1076.747448] ? count.constprop.0+0x1b3/0x290 [ 1076.747880] copy_string_kernel+0x1b4/0x450 [ 1076.748311] do_execveat_common+0x525/0x8d0 [ 1076.748732] ? bprm_execve+0x1960/0x1960 [ 1076.749150] __x64_sys_execveat+0xed/0x140 [ 1076.749575] do_syscall_64+0x33/0x40 [ 1076.749935] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1076.750432] RIP: 0033:0x7f3739cfbb19 [ 1076.750795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1076.752606] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1076.753351] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1076.754041] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1076.754718] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1076.755402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1076.755756] FAULT_INJECTION: forcing a failure. [ 1076.755756] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.756077] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1076.759365] CPU: 0 PID: 10275 Comm: syz-executor.3 Not tainted 5.10.223 #1 [ 1076.760516] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1076.761906] Call Trace: [ 1076.762361] dump_stack+0x107/0x167 [ 1076.762985] should_fail.cold+0x5/0xa [ 1076.763634] ? prepare_creds+0x25/0x5e0 [ 1076.764302] should_failslab+0x5/0x20 [ 1076.764944] kmem_cache_alloc+0x5b/0x310 [ 1076.765656] prepare_creds+0x25/0x5e0 [ 1076.766304] prepare_exec_creds+0xd/0x260 [ 1076.767002] bprm_execve+0x118/0x1960 [ 1076.767656] ? count.constprop.0+0x1b3/0x290 [ 1076.768429] ? open_exec+0x70/0x70 [ 1076.769024] ? copy_string_kernel+0x3b6/0x450 [ 1076.769807] do_execveat_common+0x772/0x8d0 [ 1076.770540] ? bprm_execve+0x1960/0x1960 [ 1076.771260] __x64_sys_execveat+0xed/0x140 [ 1076.771981] do_syscall_64+0x33/0x40 01:22:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:22:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000000700000000000000000300"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1076.772606] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1076.773573] RIP: 0033:0x7ff1f507cb19 [ 1076.774196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1076.777202] RSP: 002b:00007ff1f25f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1076.778473] RAX: ffffffffffffffda RBX: 00007ff1f518ff60 RCX: 00007ff1f507cb19 [ 1076.779653] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1076.780831] RBP: 00007ff1f25f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1076.782017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1076.783187] R13: 00007fff22a348bf R14: 00007ff1f25f2300 R15: 0000000000022000 [ 1076.784593] hpet: Lost 1 RTC interrupts [ 1076.786639] FAULT_INJECTION: forcing a failure. [ 1076.786639] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.788490] CPU: 0 PID: 10261 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1076.789631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1076.790981] Call Trace: [ 1076.791426] dump_stack+0x107/0x167 [ 1076.792033] should_fail.cold+0x5/0xa [ 1076.792671] ? alloc_bprm+0x51/0x8f0 [ 1076.793294] should_failslab+0x5/0x20 [ 1076.793933] kmem_cache_alloc_trace+0x55/0x320 [ 1076.794687] ? lock_downgrade+0x6d0/0x6d0 [ 1076.795384] alloc_bprm+0x51/0x8f0 [ 1076.795972] ? __virt_addr_valid+0x170/0x5d0 [ 1076.796718] do_execveat_common+0x275/0x8d0 [ 1076.797445] ? strncpy_from_user+0x9e/0x470 [ 1076.798158] ? bprm_execve+0x1960/0x1960 [ 1076.798871] __x64_sys_execveat+0xed/0x140 [ 1076.799617] do_syscall_64+0x33/0x40 [ 1076.800234] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1076.801070] RIP: 0033:0x7f1d9af7cb19 [ 1076.801695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1076.804664] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1076.805918] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1076.807073] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1076.808224] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1076.809374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1076.810531] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1076.811364] cgroup: fork rejected by pids controller in /syz5 [ 1076.821452] FAULT_INJECTION: forcing a failure. [ 1076.821452] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.823352] CPU: 0 PID: 10277 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1076.824484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1076.825841] Call Trace: [ 1076.826283] dump_stack+0x107/0x167 [ 1076.826895] should_fail.cold+0x5/0xa [ 1076.827528] ? create_object.isra.0+0x3a/0xa20 [ 1076.828279] should_failslab+0x5/0x20 [ 1076.828901] kmem_cache_alloc+0x5b/0x310 [ 1076.829590] create_object.isra.0+0x3a/0xa20 [ 1076.830312] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1076.831182] kmem_cache_alloc+0x159/0x310 [ 1076.831881] __anon_vma_prepare+0x270/0x500 [ 1076.832577] ? __pte_alloc+0x194/0x330 [ 1076.833220] handle_mm_fault+0x2b2d/0x3500 [ 1076.833931] ? perf_trace_lock+0x2bd/0x490 [ 1076.834627] ? __lockdep_reset_lock+0x180/0x180 [ 1076.835382] ? __pmd_alloc+0x5e0/0x5e0 [ 1076.836075] __get_user_pages+0x6ec/0x1620 [ 1076.836792] ? follow_page_mask+0x1900/0x1900 [ 1076.837527] ? __lockdep_reset_lock+0x180/0x180 [ 1076.838284] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1076.839077] __get_user_pages_remote+0x1d5/0x870 [ 1076.839849] ? lock_downgrade+0x6d0/0x6d0 [ 1076.840546] get_user_pages_remote+0x63/0x90 [ 1076.841279] get_arg_page+0xba/0x200 [ 1076.841914] ? acct_arg_size+0xe0/0xe0 [ 1076.842544] ? downgrade_write+0x3a0/0x3a0 [ 1076.843242] ? count.constprop.0+0x1b3/0x290 [ 1076.843975] copy_string_kernel+0x1b4/0x450 [ 1076.844703] do_execveat_common+0x525/0x8d0 [ 1076.845424] ? bprm_execve+0x1960/0x1960 [ 1076.846124] __x64_sys_execveat+0xed/0x140 [ 1076.846826] do_syscall_64+0x33/0x40 [ 1076.847428] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1076.848250] RIP: 0033:0x7fa50365eb19 [ 1076.848853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1076.851784] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1076.853001] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1076.854146] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1076.855283] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1076.856417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1076.857564] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1076.858877] hpet: Lost 1 RTC interrupts 01:22:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) [ 1076.965029] FAULT_INJECTION: forcing a failure. [ 1076.965029] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.966128] CPU: 1 PID: 10579 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1076.966736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1076.967462] Call Trace: [ 1076.967706] dump_stack+0x107/0x167 [ 1076.968039] should_fail.cold+0x5/0xa [ 1076.968385] ? prepare_creds+0x25/0x5e0 [ 1076.968743] should_failslab+0x5/0x20 [ 1076.969081] kmem_cache_alloc+0x5b/0x310 [ 1076.969461] prepare_creds+0x25/0x5e0 [ 1076.969801] prepare_exec_creds+0xd/0x260 [ 1076.970173] bprm_execve+0x118/0x1960 [ 1076.970512] ? count.constprop.0+0x1b3/0x290 [ 1076.970905] ? open_exec+0x70/0x70 [ 1076.971217] ? copy_string_kernel+0x3b6/0x450 [ 1076.971703] do_execveat_common+0x772/0x8d0 [ 1076.972090] ? bprm_execve+0x1960/0x1960 [ 1076.972463] __x64_sys_execveat+0xed/0x140 [ 1076.972843] do_syscall_64+0x33/0x40 [ 1076.973171] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1076.973627] RIP: 0033:0x7f3739cfbb19 [ 1076.973953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1076.975519] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1076.976178] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1076.976786] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1076.977408] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1076.978019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1076.978632] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 01:23:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) 01:23:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 01:23:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) 01:23:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) 01:23:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040000000000000000000000200000000000000000000380002000000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) [ 1091.619254] FAULT_INJECTION: forcing a failure. [ 1091.619254] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.621012] CPU: 1 PID: 10603 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1091.622053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.623306] Call Trace: [ 1091.623701] dump_stack+0x107/0x167 [ 1091.624208] should_fail.cold+0x5/0xa [ 1091.624775] ? create_object.isra.0+0x3a/0xa20 [ 1091.625404] should_failslab+0x5/0x20 [ 1091.626029] kmem_cache_alloc+0x5b/0x310 [ 1091.626640] create_object.isra.0+0x3a/0xa20 [ 1091.627280] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1091.627985] kmem_cache_alloc_trace+0x151/0x320 [ 1091.628820] ? lock_downgrade+0x6d0/0x6d0 [ 1091.629527] alloc_bprm+0x51/0x8f0 [ 1091.630055] ? __virt_addr_valid+0x170/0x5d0 [ 1091.630076] FAULT_INJECTION: forcing a failure. [ 1091.630076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1091.632552] do_execveat_common+0x275/0x8d0 [ 1091.633153] ? strncpy_from_user+0x9e/0x470 [ 1091.633757] ? bprm_execve+0x1960/0x1960 [ 1091.634350] __x64_sys_execveat+0xed/0x140 [ 1091.634941] do_syscall_64+0x33/0x40 [ 1091.635458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1091.636153] RIP: 0033:0x7f1d9af7cb19 [ 1091.636670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.639477] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1091.640501] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1091.641574] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1091.642732] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1091.643690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1091.644825] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1091.645965] CPU: 0 PID: 10608 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1091.646995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.648157] Call Trace: [ 1091.648552] dump_stack+0x107/0x167 [ 1091.649076] should_fail.cold+0x5/0xa [ 1091.649640] __alloc_pages_nodemask+0x182/0x600 [ 1091.650343] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1091.651192] ? up_write+0x191/0x550 [ 1091.651729] ? rwlock_bug.part.0+0x90/0x90 [ 1091.652337] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1091.653116] alloc_pages_vma+0xbb/0x410 [ 1091.653733] handle_mm_fault+0x152f/0x3500 [ 1091.654377] ? perf_trace_lock+0x2bd/0x490 [ 1091.655000] ? __lockdep_reset_lock+0x180/0x180 [ 1091.655661] ? __pmd_alloc+0x5e0/0x5e0 [ 1091.656265] __get_user_pages+0x6ec/0x1620 [ 1091.656890] ? follow_page_mask+0x1900/0x1900 [ 1091.657565] ? __lockdep_reset_lock+0x180/0x180 [ 1091.658263] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1091.658961] __get_user_pages_remote+0x1d5/0x870 [ 1091.659642] ? lock_downgrade+0x6d0/0x6d0 [ 1091.660251] get_user_pages_remote+0x63/0x90 [ 1091.660891] get_arg_page+0xba/0x200 [ 1091.661441] ? acct_arg_size+0xe0/0xe0 [ 1091.662046] ? downgrade_write+0x3a0/0x3a0 [ 1091.662671] ? count.constprop.0+0x1b3/0x290 [ 1091.663311] copy_string_kernel+0x1b4/0x450 [ 1091.663950] do_execveat_common+0x525/0x8d0 [ 1091.664576] ? bprm_execve+0x1960/0x1960 [ 1091.665191] __x64_sys_execveat+0xed/0x140 [ 1091.665814] do_syscall_64+0x33/0x40 [ 1091.666379] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1091.667104] RIP: 0033:0x7fa50365eb19 [ 1091.667635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.670230] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1091.671304] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1091.672310] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1091.673305] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1091.674346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1091.675351] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1091.676536] hpet: Lost 1 RTC interrupts [ 1091.678494] FAULT_INJECTION: forcing a failure. [ 1091.678494] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.680172] CPU: 0 PID: 10595 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1091.681184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.682400] Call Trace: [ 1091.682792] dump_stack+0x107/0x167 [ 1091.683319] should_fail.cold+0x5/0xa [ 1091.683883] ? prepare_creds+0x25/0x5e0 [ 1091.684457] should_failslab+0x5/0x20 [ 1091.685028] kmem_cache_alloc+0x5b/0x310 [ 1091.685633] prepare_creds+0x25/0x5e0 [ 1091.686229] prepare_exec_creds+0xd/0x260 [ 1091.686824] bprm_execve+0x118/0x1960 [ 1091.687377] ? count.constprop.0+0x1b3/0x290 [ 1091.688013] ? open_exec+0x70/0x70 [ 1091.688527] ? copy_string_kernel+0x3b6/0x450 [ 1091.689189] do_execveat_common+0x772/0x8d0 [ 1091.689820] ? bprm_execve+0x1960/0x1960 [ 1091.690467] __x64_sys_execveat+0xed/0x140 [ 1091.691082] do_syscall_64+0x33/0x40 [ 1091.691617] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1091.692339] RIP: 0033:0x7f3739cfbb19 [ 1091.692871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.695454] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1091.696536] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1091.697545] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1091.698580] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1091.699584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1091.700589] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1091.701778] hpet: Lost 1 RTC interrupts 01:23:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040000000000000000000000200000000000000000000380002000000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 01:23:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) 01:23:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 01:23:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040000000000000000000000200000000000000000000380002000000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1091.987436] FAULT_INJECTION: forcing a failure. [ 1091.987436] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.989648] CPU: 1 PID: 10935 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1091.990918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.992135] Call Trace: [ 1091.992544] dump_stack+0x107/0x167 [ 1091.993071] should_fail.cold+0x5/0xa [ 1091.993653] ? mm_alloc+0x19/0xd0 [ 1091.994181] should_failslab+0x5/0x20 [ 1091.994734] kmem_cache_alloc+0x5b/0x310 [ 1091.995341] ? kasan_unpoison_shadow+0x33/0x50 [ 1091.996014] mm_alloc+0x19/0xd0 [ 1091.996491] alloc_bprm+0x1cb/0x8f0 [ 1091.997012] ? __virt_addr_valid+0x170/0x5d0 [ 1091.997759] do_execveat_common+0x275/0x8d0 [ 1091.998379] ? strncpy_from_user+0x9e/0x470 [ 1091.998990] ? bprm_execve+0x1960/0x1960 [ 1091.999599] __x64_sys_execveat+0xed/0x140 [ 1092.000279] do_syscall_64+0x33/0x40 [ 1092.000823] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1092.001622] RIP: 0033:0x7f1d9af7cb19 [ 1092.002138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.004861] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1092.005110] FAULT_INJECTION: forcing a failure. [ 1092.005110] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.005968] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1092.005982] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1092.005993] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1092.006004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1092.006015] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1092.013615] CPU: 0 PID: 10968 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1092.014677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1092.015929] Call Trace: [ 1092.016360] dump_stack+0x107/0x167 [ 1092.016954] should_fail.cold+0x5/0xa [ 1092.017581] ? security_prepare_creds+0x112/0x190 [ 1092.018342] should_failslab+0x5/0x20 [ 1092.018946] __kmalloc+0x72/0x390 [ 1092.019508] security_prepare_creds+0x112/0x190 [ 1092.020257] prepare_creds+0x452/0x5e0 [ 1092.020872] prepare_exec_creds+0xd/0x260 [ 1092.021540] bprm_execve+0x118/0x1960 [ 1092.022149] ? count.constprop.0+0x1b3/0x290 [ 1092.022856] ? open_exec+0x70/0x70 [ 1092.023427] ? copy_string_kernel+0x3b6/0x450 [ 1092.024170] do_execveat_common+0x772/0x8d0 [ 1092.024867] ? bprm_execve+0x1960/0x1960 [ 1092.025564] __x64_sys_execveat+0xed/0x140 [ 1092.026246] do_syscall_64+0x33/0x40 [ 1092.026844] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1092.027644] RIP: 0033:0x7f3739cfbb19 [ 1092.028241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.031112] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1092.032333] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1092.033473] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1092.034621] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1092.035758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1092.036903] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 01:23:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) 01:23:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000000038000200000000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) [ 1092.132935] FAULT_INJECTION: forcing a failure. [ 1092.132935] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.134757] CPU: 0 PID: 11042 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1092.135837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1092.137126] Call Trace: [ 1092.137561] dump_stack+0x107/0x167 [ 1092.138186] should_fail.cold+0x5/0xa [ 1092.138802] ? prepare_creds+0x25/0x5e0 [ 1092.139443] should_failslab+0x5/0x20 [ 1092.140062] kmem_cache_alloc+0x5b/0x310 [ 1092.140723] prepare_creds+0x25/0x5e0 [ 1092.141337] prepare_exec_creds+0xd/0x260 [ 1092.142020] bprm_execve+0x118/0x1960 [ 1092.142645] ? count.constprop.0+0x1b3/0x290 [ 1092.143365] ? open_exec+0x70/0x70 [ 1092.143947] ? copy_string_kernel+0x3b6/0x450 [ 1092.144698] do_execveat_common+0x772/0x8d0 [ 1092.145402] ? bprm_execve+0x1960/0x1960 [ 1092.146112] __x64_sys_execveat+0xed/0x140 [ 1092.146814] do_syscall_64+0x33/0x40 [ 1092.147414] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1092.148242] RIP: 0033:0x7fa50365eb19 [ 1092.148845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.151810] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1092.153047] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1092.154216] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1092.155379] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1092.156535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1092.157706] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1092.159059] hpet: Lost 1 RTC interrupts 01:23:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) [ 1092.234911] FAULT_INJECTION: forcing a failure. [ 1092.234911] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.236624] CPU: 1 PID: 11087 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1092.237611] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1092.238780] Call Trace: [ 1092.239170] dump_stack+0x107/0x167 [ 1092.239699] should_fail.cold+0x5/0xa [ 1092.240252] ? mm_alloc+0x19/0xd0 [ 1092.240760] should_failslab+0x5/0x20 [ 1092.241309] kmem_cache_alloc+0x5b/0x310 [ 1092.241907] ? kasan_unpoison_shadow+0x33/0x50 [ 1092.242565] mm_alloc+0x19/0xd0 [ 1092.243060] alloc_bprm+0x1cb/0x8f0 [ 1092.243581] ? __virt_addr_valid+0x170/0x5d0 [ 1092.244220] do_execveat_common+0x275/0x8d0 [ 1092.244853] ? strncpy_from_user+0x9e/0x470 [ 1092.245472] ? bprm_execve+0x1960/0x1960 [ 1092.246092] __x64_sys_execveat+0xed/0x140 [ 1092.246711] do_syscall_64+0x33/0x40 [ 1092.247247] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1092.248053] RIP: 0033:0x7f1d9af7cb19 [ 1092.248592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.251246] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1092.252331] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1092.253332] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1092.254345] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1092.255356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1092.256365] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:23:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:23:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) 01:23:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) 01:23:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) 01:23:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 01:23:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000000038000200000000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) [ 1106.618884] FAULT_INJECTION: forcing a failure. [ 1106.618884] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.620920] CPU: 0 PID: 11268 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1106.622118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1106.623580] Call Trace: [ 1106.624085] dump_stack+0x107/0x167 [ 1106.624764] should_fail.cold+0x5/0xa [ 1106.625467] ? create_object.isra.0+0x3a/0xa20 [ 1106.626297] should_failslab+0x5/0x20 [ 1106.626973] kmem_cache_alloc+0x5b/0x310 [ 1106.627685] create_object.isra.0+0x3a/0xa20 [ 1106.628462] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1106.629334] kmem_cache_alloc+0x159/0x310 [ 1106.630097] mm_alloc+0x19/0xd0 [ 1106.630685] alloc_bprm+0x1cb/0x8f0 [ 1106.631309] ? __virt_addr_valid+0x170/0x5d0 [ 1106.632097] do_execveat_common+0x275/0x8d0 [ 1106.632836] ? strncpy_from_user+0x9e/0x470 [ 1106.633602] ? bprm_execve+0x1960/0x1960 [ 1106.634346] __x64_sys_execveat+0xed/0x140 [ 1106.635103] do_syscall_64+0x33/0x40 [ 1106.635762] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1106.636625] RIP: 0033:0x7f1d9af7cb19 [ 1106.637279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1106.640355] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1106.641710] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1106.642951] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1106.644183] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1106.645413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1106.646660] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1106.648101] hpet: Lost 1 RTC interrupts [ 1106.658533] FAULT_INJECTION: forcing a failure. [ 1106.658533] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.659607] CPU: 1 PID: 11266 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1106.660180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1106.660861] Call Trace: [ 1106.661088] dump_stack+0x107/0x167 [ 1106.661394] should_fail.cold+0x5/0xa [ 1106.661723] ? create_object.isra.0+0x3a/0xa20 [ 1106.662110] should_failslab+0x5/0x20 [ 1106.662436] kmem_cache_alloc+0x5b/0x310 [ 1106.662788] create_object.isra.0+0x3a/0xa20 [ 1106.663162] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1106.663593] kmem_cache_alloc+0x159/0x310 [ 1106.663945] prepare_creds+0x25/0x5e0 [ 1106.664269] prepare_exec_creds+0xd/0x260 [ 1106.664617] bprm_execve+0x118/0x1960 [ 1106.664940] ? count.constprop.0+0x1b3/0x290 [ 1106.665308] ? open_exec+0x70/0x70 [ 1106.665603] ? copy_string_kernel+0x3b6/0x450 [ 1106.665994] do_execveat_common+0x772/0x8d0 [ 1106.666358] ? bprm_execve+0x1960/0x1960 [ 1106.666719] __x64_sys_execveat+0xed/0x140 [ 1106.667074] do_syscall_64+0x33/0x40 [ 1106.667384] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1106.667807] RIP: 0033:0x7fa50365eb19 [ 1106.668116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1106.669612] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1106.670243] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1106.670821] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1106.671404] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1106.671972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1106.672556] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1106.681046] FAULT_INJECTION: forcing a failure. [ 1106.681046] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.682717] CPU: 0 PID: 11368 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1106.683726] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1106.684971] Call Trace: [ 1106.685368] dump_stack+0x107/0x167 [ 1106.685919] should_fail.cold+0x5/0xa [ 1106.686481] ? create_object.isra.0+0x3a/0xa20 [ 1106.687134] should_failslab+0x5/0x20 [ 1106.687693] kmem_cache_alloc+0x5b/0x310 [ 1106.688290] create_object.isra.0+0x3a/0xa20 [ 1106.688991] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1106.689743] __kmalloc+0x16e/0x390 [ 1106.690285] security_prepare_creds+0x112/0x190 [ 1106.690964] prepare_creds+0x452/0x5e0 [ 1106.691541] prepare_exec_creds+0xd/0x260 [ 1106.692144] bprm_execve+0x118/0x1960 [ 1106.692754] ? count.constprop.0+0x1b3/0x290 [ 1106.693397] ? open_exec+0x70/0x70 [ 1106.693934] ? copy_string_kernel+0x3b6/0x450 [ 1106.694603] do_execveat_common+0x772/0x8d0 [ 1106.695249] ? bprm_execve+0x1960/0x1960 [ 1106.695869] __x64_sys_execveat+0xed/0x140 [ 1106.696504] do_syscall_64+0x33/0x40 [ 1106.697072] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1106.697829] RIP: 0033:0x7f3739cfbb19 01:23:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000000038000200000000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1106.698364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1106.701205] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1106.702297] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1106.703306] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1106.704352] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1106.705406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1106.706415] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1106.707615] hpet: Lost 1 RTC interrupts 01:23:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 01:23:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:23:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 01:23:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 01:23:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 01:23:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 01:23:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:23:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) 01:23:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) [ 1120.867157] FAULT_INJECTION: forcing a failure. [ 1120.867157] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.868345] FAULT_INJECTION: forcing a failure. [ 1120.868345] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.869017] CPU: 1 PID: 11714 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1120.871430] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1120.872716] Call Trace: [ 1120.873124] dump_stack+0x107/0x167 [ 1120.873682] should_fail.cold+0x5/0xa [ 1120.874273] ? vm_area_alloc+0x1c/0x110 [ 1120.874880] should_failslab+0x5/0x20 [ 1120.875457] kmem_cache_alloc+0x5b/0x310 [ 1120.876085] vm_area_alloc+0x1c/0x110 [ 1120.876660] alloc_bprm+0x337/0x8f0 [ 1120.877210] ? __virt_addr_valid+0x170/0x5d0 [ 1120.877884] do_execveat_common+0x275/0x8d0 [ 1120.878536] ? strncpy_from_user+0x9e/0x470 [ 1120.879185] ? bprm_execve+0x1960/0x1960 [ 1120.879825] __x64_sys_execveat+0xed/0x140 [ 1120.880471] do_syscall_64+0x33/0x40 [ 1120.881027] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1120.881790] RIP: 0033:0x7f1d9af7cb19 [ 1120.882344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1120.885009] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1120.886143] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1120.887286] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1120.888349] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1120.889406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1120.890470] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1120.891594] CPU: 0 PID: 11720 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1120.892484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1120.893536] Call Trace: [ 1120.893917] dump_stack+0x107/0x167 [ 1120.894403] should_fail.cold+0x5/0xa [ 1120.894899] ? security_prepare_creds+0x112/0x190 [ 1120.895516] should_failslab+0x5/0x20 [ 1120.896008] __kmalloc+0x72/0x390 [ 1120.896467] security_prepare_creds+0x112/0x190 [ 1120.897067] prepare_creds+0x452/0x5e0 [ 1120.897571] prepare_exec_creds+0xd/0x260 [ 1120.898121] bprm_execve+0x118/0x1960 [ 1120.898148] FAULT_INJECTION: forcing a failure. [ 1120.898148] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.898618] ? count.constprop.0+0x1b3/0x290 [ 1120.898651] ? open_exec+0x70/0x70 [ 1120.901233] ? copy_string_kernel+0x3b6/0x450 [ 1120.901849] do_execveat_common+0x772/0x8d0 [ 1120.902405] ? bprm_execve+0x1960/0x1960 [ 1120.902989] __x64_sys_execveat+0xed/0x140 [ 1120.903532] do_syscall_64+0x33/0x40 [ 1120.904008] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1120.904648] RIP: 0033:0x7fa50365eb19 [ 1120.905118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1120.907411] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1120.908365] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1120.909256] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1120.910186] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1120.911084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1120.911976] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1120.912910] CPU: 1 PID: 11712 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1120.914023] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1120.915205] Call Trace: [ 1120.915593] dump_stack+0x107/0x167 [ 1120.916125] should_fail.cold+0x5/0xa [ 1120.916682] ? __alloc_file+0x21/0x320 [ 1120.917255] should_failslab+0x5/0x20 [ 1120.917814] kmem_cache_alloc+0x5b/0x310 [ 1120.918486] __alloc_file+0x21/0x320 [ 1120.919046] alloc_empty_file+0x6d/0x170 [ 1120.919641] path_openat+0xe6/0x2770 [ 1120.920208] ? lock_chain_count+0x20/0x20 [ 1120.920815] ? stack_trace_consume_entry+0x160/0x160 [ 1120.921558] ? path_lookupat+0x860/0x860 [ 1120.922175] ? kasan_save_stack+0x32/0x40 [ 1120.922776] ? kasan_save_stack+0x1b/0x40 [ 1120.923380] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1120.924108] ? security_prepare_creds+0x112/0x190 [ 1120.924809] ? prepare_creds+0x452/0x5e0 [ 1120.925401] ? prepare_exec_creds+0xd/0x260 [ 1120.926038] do_filp_open+0x190/0x3e0 [ 1120.926602] ? may_open_dev+0xf0/0xf0 [ 1120.927157] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1120.927894] ? perf_trace_lock+0x2bd/0x490 [ 1120.928521] ? __lockdep_reset_lock+0x180/0x180 [ 1120.929209] ? find_held_lock+0x2c/0x110 [ 1120.929809] do_open_execat+0x116/0x750 [ 1120.930374] ? bprm_execve+0x49d/0x1960 [ 1120.930947] ? __do_sys_uselib+0x680/0x680 [ 1120.931562] ? do_raw_spin_lock+0x121/0x260 [ 1120.932182] ? rwlock_bug.part.0+0x90/0x90 [ 1120.932823] bprm_execve+0x4dc/0x1960 [ 1120.933378] ? count.constprop.0+0x1b3/0x290 [ 1120.934062] ? open_exec+0x70/0x70 [ 1120.934595] ? copy_string_kernel+0x3b6/0x450 [ 1120.935269] do_execveat_common+0x772/0x8d0 [ 1120.935901] ? bprm_execve+0x1960/0x1960 [ 1120.936517] __x64_sys_execveat+0xed/0x140 [ 1120.937145] do_syscall_64+0x33/0x40 [ 1120.937679] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1120.938426] RIP: 0033:0x7f3739cfbb19 [ 1120.938959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1120.941879] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1120.943128] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1120.944320] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1120.945471] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1120.946664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1120.947864] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 01:23:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 01:23:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) [ 1121.105851] FAULT_INJECTION: forcing a failure. [ 1121.105851] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.107270] CPU: 0 PID: 11994 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1121.108044] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1121.108960] Call Trace: [ 1121.109277] dump_stack+0x107/0x167 [ 1121.109696] should_fail.cold+0x5/0xa [ 1121.110166] ? create_object.isra.0+0x3a/0xa20 [ 1121.110692] should_failslab+0x5/0x20 [ 1121.111132] kmem_cache_alloc+0x5b/0x310 [ 1121.111600] create_object.isra.0+0x3a/0xa20 [ 1121.112088] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1121.112660] __kmalloc+0x16e/0x390 [ 1121.113080] security_prepare_creds+0x112/0x190 [ 1121.113615] prepare_creds+0x452/0x5e0 [ 1121.114080] prepare_exec_creds+0xd/0x260 [ 1121.114549] bprm_execve+0x118/0x1960 [ 1121.114985] ? count.constprop.0+0x1b3/0x290 [ 1121.115482] ? open_exec+0x70/0x70 [ 1121.115880] ? copy_string_kernel+0x3b6/0x450 [ 1121.116398] do_execveat_common+0x772/0x8d0 [ 1121.116894] ? bprm_execve+0x1960/0x1960 [ 1121.117379] __x64_sys_execveat+0xed/0x140 [ 1121.117886] do_syscall_64+0x33/0x40 [ 1121.118306] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1121.118874] RIP: 0033:0x7fa50365eb19 [ 1121.119290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1121.121301] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1121.122198] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1121.122985] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1121.123613] FAULT_INJECTION: forcing a failure. [ 1121.123613] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.123771] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.123790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1121.126972] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1121.127797] CPU: 1 PID: 12014 Comm: syz-executor.0 Not tainted 5.10.223 #1 [ 1121.128874] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1121.130077] Call Trace: [ 1121.130479] dump_stack+0x107/0x167 [ 1121.131025] should_fail.cold+0x5/0xa [ 1121.131592] ? getname_flags.part.0+0x50/0x4f0 [ 1121.132263] should_failslab+0x5/0x20 [ 1121.132832] kmem_cache_alloc+0x5b/0x310 [ 1121.133438] getname_flags.part.0+0x50/0x4f0 [ 1121.134103] getname_flags+0x9a/0xe0 [ 1121.134661] __x64_sys_execveat+0xd6/0x140 [ 1121.135292] do_syscall_64+0x33/0x40 [ 1121.135840] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1121.136581] RIP: 0033:0x7fd1ac9dab19 [ 1121.137172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1121.139782] RSP: 002b:00007fd1a9f50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1121.140885] RAX: ffffffffffffffda RBX: 00007fd1acaedf60 RCX: 00007fd1ac9dab19 [ 1121.141907] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1121.142932] RBP: 00007fd1a9f501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.143955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 01:23:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) [ 1121.144980] R13: 00007ffff48c756f R14: 00007fd1a9f50300 R15: 0000000000022000 01:23:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) [ 1121.180139] FAULT_INJECTION: forcing a failure. 01:23:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) [ 1121.180139] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.182288] CPU: 1 PID: 12033 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1121.183393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1121.184783] Call Trace: [ 1121.185220] dump_stack+0x107/0x167 [ 1121.185824] should_fail.cold+0x5/0xa [ 1121.186443] ? create_object.isra.0+0x3a/0xa20 [ 1121.187187] should_failslab+0x5/0x20 [ 1121.187805] kmem_cache_alloc+0x5b/0x310 [ 1121.188478] create_object.isra.0+0x3a/0xa20 [ 1121.189186] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1121.190013] kmem_cache_alloc+0x159/0x310 [ 1121.190699] vm_area_alloc+0x1c/0x110 [ 1121.191318] alloc_bprm+0x337/0x8f0 [ 1121.191901] ? __virt_addr_valid+0x170/0x5d0 [ 1121.192624] do_execveat_common+0x275/0x8d0 [ 1121.193321] ? strncpy_from_user+0x9e/0x470 [ 1121.194021] ? bprm_execve+0x1960/0x1960 [ 1121.194705] __x64_sys_execveat+0xed/0x140 [ 1121.195395] do_syscall_64+0x33/0x40 [ 1121.195999] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1121.196816] RIP: 0033:0x7f1d9af7cb19 [ 1121.197413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1121.200389] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1121.201598] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1121.202723] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1121.203841] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.204955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1121.206072] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:23:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 01:23:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) 01:23:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 01:23:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) [ 1121.353730] FAULT_INJECTION: forcing a failure. [ 1121.353730] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.355622] CPU: 1 PID: 12246 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1121.356788] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1121.358054] Call Trace: [ 1121.358477] dump_stack+0x107/0x167 [ 1121.359048] should_fail.cold+0x5/0xa [ 1121.359648] ? create_object.isra.0+0x3a/0xa20 [ 1121.360362] should_failslab+0x5/0x20 [ 1121.360963] kmem_cache_alloc+0x5b/0x310 [ 1121.361601] create_object.isra.0+0x3a/0xa20 [ 1121.362296] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1121.363085] kmem_cache_alloc+0x159/0x310 [ 1121.363750] __alloc_file+0x21/0x320 [ 1121.364325] alloc_empty_file+0x6d/0x170 [ 1121.364965] path_openat+0xe6/0x2770 [ 1121.365552] ? lock_chain_count+0x20/0x20 [ 1121.366206] ? stack_trace_consume_entry+0x160/0x160 [ 1121.366984] ? path_lookupat+0x860/0x860 [ 1121.367639] ? kasan_save_stack+0x32/0x40 [ 1121.368282] ? kasan_save_stack+0x1b/0x40 [ 1121.368927] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1121.369703] ? security_prepare_creds+0x112/0x190 [ 1121.370452] ? prepare_creds+0x452/0x5e0 [ 1121.371083] ? prepare_exec_creds+0xd/0x260 [ 1121.371855] do_filp_open+0x190/0x3e0 [ 1121.372451] ? may_open_dev+0xf0/0xf0 [ 1121.373043] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1121.373484] FAULT_INJECTION: forcing a failure. [ 1121.373484] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.373837] ? perf_trace_lock+0x2bd/0x490 [ 1121.373884] ? __lockdep_reset_lock+0x180/0x180 [ 1121.376250] ? find_held_lock+0x2c/0x110 [ 1121.376885] do_open_execat+0x116/0x750 [ 1121.377500] ? bprm_execve+0x49d/0x1960 [ 1121.378130] ? __do_sys_uselib+0x680/0x680 [ 1121.378790] ? do_raw_spin_lock+0x121/0x260 [ 1121.379456] ? rwlock_bug.part.0+0x90/0x90 [ 1121.380147] bprm_execve+0x4dc/0x1960 [ 1121.380750] ? count.constprop.0+0x1b3/0x290 [ 1121.381438] ? open_exec+0x70/0x70 [ 1121.382000] ? copy_string_kernel+0x3b6/0x450 [ 1121.382719] do_execveat_common+0x772/0x8d0 [ 1121.383393] ? bprm_execve+0x1960/0x1960 [ 1121.384063] __x64_sys_execveat+0xed/0x140 [ 1121.384724] do_syscall_64+0x33/0x40 [ 1121.385303] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1121.386089] RIP: 0033:0x7f3739cfbb19 [ 1121.386670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1121.389511] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1121.390692] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1121.391782] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1121.392875] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.393964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1121.395051] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1121.396178] CPU: 0 PID: 12254 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1121.396819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1121.397563] Call Trace: [ 1121.397837] dump_stack+0x107/0x167 [ 1121.398177] should_fail.cold+0x5/0xa [ 1121.398530] ? __alloc_file+0x21/0x320 [ 1121.398903] should_failslab+0x5/0x20 [ 1121.399252] kmem_cache_alloc+0x5b/0x310 [ 1121.399647] __alloc_file+0x21/0x320 [ 1121.399988] alloc_empty_file+0x6d/0x170 [ 1121.400367] path_openat+0xe6/0x2770 [ 1121.400716] ? lock_chain_count+0x20/0x20 [ 1121.401103] ? stack_trace_consume_entry+0x160/0x160 [ 1121.401559] ? path_lookupat+0x860/0x860 [ 1121.401960] ? kasan_save_stack+0x32/0x40 [ 1121.402333] ? kasan_save_stack+0x1b/0x40 [ 1121.402720] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1121.403201] ? security_prepare_creds+0x112/0x190 [ 1121.403640] ? prepare_creds+0x452/0x5e0 [ 1121.404006] ? prepare_exec_creds+0xd/0x260 [ 1121.404402] do_filp_open+0x190/0x3e0 [ 1121.404751] ? may_open_dev+0xf0/0xf0 [ 1121.405097] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1121.405554] ? perf_trace_lock+0x2bd/0x490 [ 1121.405979] ? __lockdep_reset_lock+0x180/0x180 [ 1121.406409] ? find_held_lock+0x2c/0x110 [ 1121.406781] do_open_execat+0x116/0x750 [ 1121.407139] ? bprm_execve+0x49d/0x1960 [ 1121.407508] ? __do_sys_uselib+0x680/0x680 [ 1121.407895] ? do_raw_spin_lock+0x121/0x260 [ 1121.408290] ? rwlock_bug.part.0+0x90/0x90 [ 1121.408689] bprm_execve+0x4dc/0x1960 [ 1121.409040] ? count.constprop.0+0x1b3/0x290 [ 1121.409436] ? open_exec+0x70/0x70 [ 1121.409771] ? copy_string_kernel+0x3b6/0x450 [ 1121.410194] do_execveat_common+0x772/0x8d0 [ 1121.410585] ? bprm_execve+0x1960/0x1960 [ 1121.410975] __x64_sys_execveat+0xed/0x140 [ 1121.411363] do_syscall_64+0x33/0x40 [ 1121.411703] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1121.412168] RIP: 0033:0x7fa50365eb19 [ 1121.412508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1121.414133] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1121.414815] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1121.415447] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1121.416079] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.416632] FAULT_INJECTION: forcing a failure. [ 1121.416632] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.416717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1121.416736] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1121.419749] CPU: 1 PID: 12261 Comm: syz-executor.0 Not tainted 5.10.223 #1 [ 1121.419838] hpet: Lost 1 RTC interrupts [ 1121.420859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1121.422478] Call Trace: [ 1121.422902] dump_stack+0x107/0x167 [ 1121.423481] should_fail.cold+0x5/0xa [ 1121.424103] ? create_object.isra.0+0x3a/0xa20 [ 1121.424816] should_failslab+0x5/0x20 [ 1121.425410] kmem_cache_alloc+0x5b/0x310 [ 1121.426068] create_object.isra.0+0x3a/0xa20 [ 1121.426763] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1121.427559] kmem_cache_alloc+0x159/0x310 [ 1121.428231] getname_flags.part.0+0x50/0x4f0 [ 1121.428921] getname_flags+0x9a/0xe0 [ 1121.429518] __x64_sys_execveat+0xd6/0x140 [ 1121.430190] do_syscall_64+0x33/0x40 [ 1121.430778] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1121.431564] RIP: 0033:0x7fd1ac9dab19 [ 1121.432147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1121.435027] RSP: 002b:00007fd1a9f50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1121.436222] RAX: ffffffffffffffda RBX: 00007fd1acaedf60 RCX: 00007fd1ac9dab19 [ 1121.437313] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1121.438414] RBP: 00007fd1a9f501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.439505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1121.440612] R13: 00007ffff48c756f R14: 00007fd1a9f50300 R15: 0000000000022000 01:23:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) 01:23:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 01:23:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 01:23:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 01:23:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) 01:23:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:23:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) [ 1137.931110] FAULT_INJECTION: forcing a failure. [ 1137.931110] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1137.932379] CPU: 1 PID: 12475 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1137.933096] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1137.933954] Call Trace: [ 1137.934240] dump_stack+0x107/0x167 [ 1137.934626] should_fail.cold+0x5/0xa [ 1137.935032] __alloc_pages_nodemask+0x182/0x600 [ 1137.935597] ? __lockdep_reset_lock+0x180/0x180 [ 1137.936084] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1137.936700] ? add_mm_counter_fast+0x220/0x220 [ 1137.937192] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1137.937739] alloc_pages_current+0x187/0x280 [ 1137.938216] get_zeroed_page+0x14/0xb0 [ 1137.938621] __pud_alloc+0x33/0x270 [ 1137.939004] handle_mm_fault+0x1a73/0x3500 [ 1137.939446] ? perf_trace_lock+0x2bd/0x490 [ 1137.939883] ? __lockdep_reset_lock+0x180/0x180 [ 1137.940364] ? __pmd_alloc+0x5e0/0x5e0 [ 1137.940800] __get_user_pages+0x6ec/0x1620 [ 1137.941251] ? follow_page_mask+0x1900/0x1900 [ 1137.941714] ? __lockdep_reset_lock+0x180/0x180 [ 1137.942205] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1137.942708] __get_user_pages_remote+0x1d5/0x870 [ 1137.943202] ? lock_downgrade+0x6d0/0x6d0 [ 1137.943639] get_user_pages_remote+0x63/0x90 [ 1137.944102] get_arg_page+0xba/0x200 [ 1137.944490] ? acct_arg_size+0xe0/0xe0 [ 1137.944894] ? downgrade_write+0x3a0/0x3a0 [ 1137.945375] ? count.constprop.0+0x1b3/0x290 [ 1137.945840] copy_string_kernel+0x1b4/0x450 [ 1137.946310] do_execveat_common+0x525/0x8d0 [ 1137.946767] ? bprm_execve+0x1960/0x1960 [ 1137.947211] __x64_sys_execveat+0xed/0x140 [ 1137.947655] do_syscall_64+0x33/0x40 [ 1137.948039] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1137.948560] RIP: 0033:0x7f1d9af7cb19 [ 1137.948947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1137.950795] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1137.951619] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1137.952346] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1137.953072] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1137.953796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1137.954529] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1137.959752] FAULT_INJECTION: forcing a failure. [ 1137.959752] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.961613] CPU: 0 PID: 12468 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1137.962740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1137.964069] Call Trace: [ 1137.964500] dump_stack+0x107/0x167 [ 1137.965081] should_fail.cold+0x5/0xa [ 1137.965700] ? security_file_alloc+0x34/0x170 [ 1137.966420] should_failslab+0x5/0x20 [ 1137.967037] kmem_cache_alloc+0x5b/0x310 [ 1137.967701] security_file_alloc+0x34/0x170 [ 1137.968390] __alloc_file+0xb7/0x320 [ 1137.968985] alloc_empty_file+0x6d/0x170 [ 1137.969633] path_openat+0xe6/0x2770 [ 1137.970247] ? lock_chain_count+0x20/0x20 [ 1137.970909] ? stack_trace_consume_entry+0x160/0x160 [ 1137.971705] ? path_lookupat+0x860/0x860 [ 1137.972366] ? kasan_save_stack+0x32/0x40 [ 1137.973015] ? kasan_save_stack+0x1b/0x40 [ 1137.973662] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1137.974440] ? security_prepare_creds+0x112/0x190 [ 1137.975190] ? prepare_creds+0x452/0x5e0 [ 1137.975816] ? prepare_exec_creds+0xd/0x260 [ 1137.976491] do_filp_open+0x190/0x3e0 [ 1137.977082] ? may_open_dev+0xf0/0xf0 [ 1137.977678] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1137.978477] ? perf_trace_lock+0x2bd/0x490 [ 1137.979158] ? __lockdep_reset_lock+0x180/0x180 [ 1137.979892] ? find_held_lock+0x2c/0x110 [ 1137.980533] do_open_execat+0x116/0x750 [ 1137.981147] ? bprm_execve+0x49d/0x1960 [ 1137.981769] ? __do_sys_uselib+0x680/0x680 [ 1137.982438] ? do_raw_spin_lock+0x121/0x260 [ 1137.983113] ? rwlock_bug.part.0+0x90/0x90 [ 1137.983791] bprm_execve+0x4dc/0x1960 [ 1137.984396] ? count.constprop.0+0x1b3/0x290 [ 1137.985084] ? open_exec+0x70/0x70 [ 1137.985636] ? copy_string_kernel+0x3b6/0x450 [ 1137.986362] do_execveat_common+0x772/0x8d0 [ 1137.987036] ? bprm_execve+0x1960/0x1960 [ 1137.987704] __x64_sys_execveat+0xed/0x140 [ 1137.988372] do_syscall_64+0x33/0x40 [ 1137.988959] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1137.989749] RIP: 0033:0x7f3739cfbb19 [ 1137.990338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1137.993124] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1137.994302] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1137.995392] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1137.996476] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1137.997565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1137.998664] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1137.999982] hpet: Lost 2 RTC interrupts [ 1138.017787] FAULT_INJECTION: forcing a failure. [ 1138.017787] name failslab, interval 1, probability 0, space 0, times 0 [ 1138.019564] CPU: 0 PID: 12477 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1138.020624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1138.021905] Call Trace: [ 1138.022334] dump_stack+0x107/0x167 [ 1138.022916] should_fail.cold+0x5/0xa [ 1138.023518] ? create_object.isra.0+0x3a/0xa20 [ 1138.024233] should_failslab+0x5/0x20 [ 1138.024831] kmem_cache_alloc+0x5b/0x310 [ 1138.025477] create_object.isra.0+0x3a/0xa20 [ 1138.026176] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1138.026980] kmem_cache_alloc+0x159/0x310 [ 1138.027651] __alloc_file+0x21/0x320 [ 1138.028245] alloc_empty_file+0x6d/0x170 [ 1138.028898] path_openat+0xe6/0x2770 [ 1138.029524] ? lock_chain_count+0x20/0x20 [ 1138.030188] ? stack_trace_consume_entry+0x160/0x160 [ 1138.030974] ? path_lookupat+0x860/0x860 [ 1138.031112] FAULT_INJECTION: forcing a failure. [ 1138.031112] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1138.031626] ? kasan_save_stack+0x32/0x40 [ 1138.031647] ? kasan_save_stack+0x1b/0x40 [ 1138.031674] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1138.034874] ? security_prepare_creds+0x112/0x190 [ 1138.035620] ? prepare_creds+0x452/0x5e0 [ 1138.036247] ? prepare_exec_creds+0xd/0x260 [ 1138.036922] do_filp_open+0x190/0x3e0 [ 1138.037519] ? may_open_dev+0xf0/0xf0 [ 1138.038122] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1138.038918] ? perf_trace_lock+0x2bd/0x490 [ 1138.039602] ? __lockdep_reset_lock+0x180/0x180 [ 1138.040343] ? find_held_lock+0x2c/0x110 [ 1138.040987] do_open_execat+0x116/0x750 [ 1138.041612] ? bprm_execve+0x49d/0x1960 [ 1138.042245] ? __do_sys_uselib+0x680/0x680 [ 1138.042905] ? do_raw_spin_lock+0x121/0x260 [ 1138.043577] ? rwlock_bug.part.0+0x90/0x90 [ 1138.044266] bprm_execve+0x4dc/0x1960 [ 1138.044866] ? count.constprop.0+0x1b3/0x290 [ 1138.045545] ? open_exec+0x70/0x70 [ 1138.046100] ? copy_string_kernel+0x3b6/0x450 [ 1138.046808] do_execveat_common+0x772/0x8d0 [ 1138.047488] ? bprm_execve+0x1960/0x1960 [ 1138.048149] __x64_sys_execveat+0xed/0x140 [ 1138.048819] do_syscall_64+0x33/0x40 [ 1138.049400] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1138.050203] RIP: 0033:0x7fa50365eb19 [ 1138.050785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1138.053595] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1138.054781] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1138.055882] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1138.056987] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1138.058091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1138.059179] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1138.060325] CPU: 1 PID: 12591 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1138.060553] hpet: Lost 2 RTC interrupts [ 1138.061109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1138.062581] Call Trace: [ 1138.062857] dump_stack+0x107/0x167 [ 1138.063225] should_fail.cold+0x5/0xa [ 1138.063614] __alloc_pages_nodemask+0x182/0x600 [ 1138.064077] ? lock_acquire+0x197/0x470 [ 1138.064471] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1138.065214] ? lock_downgrade+0x6d0/0x6d0 [ 1138.065626] ? do_raw_spin_lock+0x121/0x260 [ 1138.066071] alloc_pages_current+0x187/0x280 [ 1138.066507] __pmd_alloc+0x37/0x5e0 [ 1138.066875] handle_mm_fault+0x1ac4/0x3500 [ 1138.067297] ? perf_trace_lock+0x2bd/0x490 [ 1138.067717] ? __lockdep_reset_lock+0x180/0x180 [ 1138.068176] ? __pmd_alloc+0x5e0/0x5e0 [ 1138.068704] __get_user_pages+0x6ec/0x1620 [ 1138.069132] ? follow_page_mask+0x1900/0x1900 [ 1138.069576] ? __lockdep_reset_lock+0x180/0x180 [ 1138.070039] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1138.070523] __get_user_pages_remote+0x1d5/0x870 [ 1138.071010] ? lock_downgrade+0x6d0/0x6d0 [ 1138.071535] get_user_pages_remote+0x63/0x90 [ 1138.071979] get_arg_page+0xba/0x200 [ 1138.072376] ? acct_arg_size+0xe0/0xe0 [ 1138.072848] ? downgrade_write+0x3a0/0x3a0 [ 1138.073344] ? count.constprop.0+0x1b3/0x290 [ 1138.073829] copy_string_kernel+0x1b4/0x450 [ 1138.074372] do_execveat_common+0x525/0x8d0 [ 1138.074835] ? bprm_execve+0x1960/0x1960 [ 1138.075314] __x64_sys_execveat+0xed/0x140 [ 1138.075835] do_syscall_64+0x33/0x40 [ 1138.076262] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1138.076840] RIP: 0033:0x7f1d9af7cb19 [ 1138.077209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1138.079294] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1138.080067] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1138.080891] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1138.081730] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1138.082618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1138.083365] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:23:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 01:23:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 01:23:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 01:23:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:24:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 01:24:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:24:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f0) [ 1138.273046] FAULT_INJECTION: forcing a failure. [ 1138.273046] name failslab, interval 1, probability 0, space 0, times 0 [ 1138.274968] CPU: 0 PID: 12908 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1138.276056] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1138.277347] Call Trace: [ 1138.277774] dump_stack+0x107/0x167 [ 1138.278360] should_fail.cold+0x5/0xa [ 1138.278999] ? create_object.isra.0+0x3a/0xa20 [ 1138.279723] should_failslab+0x5/0x20 [ 1138.280323] kmem_cache_alloc+0x5b/0x310 [ 1138.280963] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1138.281840] create_object.isra.0+0x3a/0xa20 [ 1138.282533] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1138.283346] kmem_cache_alloc+0x159/0x310 [ 1138.284017] security_file_alloc+0x34/0x170 [ 1138.284715] __alloc_file+0xb7/0x320 [ 1138.285295] alloc_empty_file+0x6d/0x170 [ 1138.285951] path_openat+0xe6/0x2770 [ 1138.286553] ? lock_chain_count+0x20/0x20 [ 1138.287205] ? stack_trace_consume_entry+0x160/0x160 [ 1138.288003] ? path_lookupat+0x860/0x860 [ 1138.288667] ? kasan_save_stack+0x32/0x40 [ 1138.289314] ? kasan_save_stack+0x1b/0x40 [ 1138.289978] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1138.290773] ? security_prepare_creds+0x112/0x190 [ 1138.291519] ? prepare_creds+0x452/0x5e0 [ 1138.292163] ? prepare_exec_creds+0xd/0x260 [ 1138.292853] do_filp_open+0x190/0x3e0 [ 1138.293448] ? may_open_dev+0xf0/0xf0 [ 1138.294066] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1138.294872] ? perf_trace_lock+0x2bd/0x490 [ 1138.295564] ? __lockdep_reset_lock+0x180/0x180 [ 1138.296317] ? find_held_lock+0x2c/0x110 [ 1138.296964] do_open_execat+0x116/0x750 [ 1138.297590] ? bprm_execve+0x49d/0x1960 [ 1138.298226] ? __do_sys_uselib+0x680/0x680 [ 1138.298892] ? do_raw_spin_lock+0x121/0x260 [ 1138.299577] ? rwlock_bug.part.0+0x90/0x90 [ 1138.300273] bprm_execve+0x4dc/0x1960 [ 1138.300891] ? count.constprop.0+0x1b3/0x290 [ 1138.301595] ? open_exec+0x70/0x70 [ 1138.302168] ? copy_string_kernel+0x3b6/0x450 [ 1138.302894] do_execveat_common+0x772/0x8d0 [ 1138.303579] ? bprm_execve+0x1960/0x1960 [ 1138.304262] __x64_sys_execveat+0xed/0x140 [ 1138.304945] do_syscall_64+0x33/0x40 [ 1138.305537] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1138.306349] RIP: 0033:0x7f3739cfbb19 [ 1138.306941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1138.309785] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1138.310979] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1138.312095] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1138.313213] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1138.314329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1138.315445] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1138.316797] hpet: Lost 2 RTC interrupts [ 1138.343971] FAULT_INJECTION: forcing a failure. [ 1138.343971] name failslab, interval 1, probability 0, space 0, times 0 [ 1138.345869] CPU: 0 PID: 13008 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1138.346973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1138.348279] Call Trace: [ 1138.348708] dump_stack+0x107/0x167 [ 1138.349295] should_fail.cold+0x5/0xa [ 1138.349920] ? security_file_alloc+0x34/0x170 [ 1138.350636] should_failslab+0x5/0x20 [ 1138.351239] kmem_cache_alloc+0x5b/0x310 [ 1138.351906] security_file_alloc+0x34/0x170 [ 1138.352606] __alloc_file+0xb7/0x320 [ 1138.353210] alloc_empty_file+0x6d/0x170 [ 1138.353863] path_openat+0xe6/0x2770 [ 1138.354477] ? lock_chain_count+0x20/0x20 [ 1138.355141] ? stack_trace_consume_entry+0x160/0x160 [ 1138.355947] ? path_lookupat+0x860/0x860 [ 1138.356608] ? kasan_save_stack+0x32/0x40 [ 1138.357295] ? kasan_save_stack+0x1b/0x40 [ 1138.357959] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1138.358753] ? security_prepare_creds+0x112/0x190 [ 1138.359513] ? prepare_creds+0x452/0x5e0 [ 1138.360152] ? prepare_exec_creds+0xd/0x260 [ 1138.360847] do_filp_open+0x190/0x3e0 [ 1138.361456] ? may_open_dev+0xf0/0xf0 [ 1138.362074] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1138.362881] ? perf_trace_lock+0x2bd/0x490 [ 1138.363577] ? __lockdep_reset_lock+0x180/0x180 [ 1138.364333] ? find_held_lock+0x2c/0x110 [ 1138.364991] do_open_execat+0x116/0x750 [ 1138.365621] ? bprm_execve+0x49d/0x1960 [ 1138.366268] ? __do_sys_uselib+0x680/0x680 [ 1138.366944] ? do_raw_spin_lock+0x121/0x260 [ 1138.367635] ? rwlock_bug.part.0+0x90/0x90 [ 1138.368331] bprm_execve+0x4dc/0x1960 [ 1138.368944] ? count.constprop.0+0x1b3/0x290 [ 1138.369648] ? open_exec+0x70/0x70 [ 1138.370221] ? copy_string_kernel+0x3b6/0x450 [ 1138.370956] do_execveat_common+0x772/0x8d0 [ 1138.371649] ? bprm_execve+0x1960/0x1960 [ 1138.372334] __x64_sys_execveat+0xed/0x140 [ 1138.373014] do_syscall_64+0x33/0x40 [ 1138.373609] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1138.374425] RIP: 0033:0x7fa50365eb19 [ 1138.375015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1138.377874] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1138.379078] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1138.380193] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1138.381309] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1138.382435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1138.383559] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1138.384849] hpet: Lost 1 RTC interrupts 01:24:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 01:24:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:24:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 01:24:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 01:24:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 01:24:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:24:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 01:24:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) [ 1150.806042] FAULT_INJECTION: forcing a failure. [ 1150.806042] name failslab, interval 1, probability 0, space 0, times 0 [ 1150.807235] CPU: 0 PID: 13128 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1150.807913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1150.808726] Call Trace: [ 1150.809003] dump_stack+0x107/0x167 [ 1150.809374] should_fail.cold+0x5/0xa [ 1150.809757] ? __pmd_alloc+0x94/0x5e0 [ 1150.810146] should_failslab+0x5/0x20 [ 1150.810531] kmem_cache_alloc+0x5b/0x310 [ 1150.810943] __pmd_alloc+0x94/0x5e0 [ 1150.811218] FAULT_INJECTION: forcing a failure. [ 1150.811218] name failslab, interval 1, probability 0, space 0, times 0 [ 1150.811309] handle_mm_fault+0x1ac4/0x3500 [ 1150.812667] ? __schedule+0x82c/0x1ea0 [ 1150.813055] ? __pmd_alloc+0x5e0/0x5e0 [ 1150.813494] __get_user_pages+0x6ec/0x1620 [ 1150.813931] ? follow_page_mask+0x1900/0x1900 [ 1150.814401] ? __lockdep_reset_lock+0x180/0x180 [ 1150.814874] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1150.815371] __get_user_pages_remote+0x1d5/0x870 [ 1150.815855] ? lock_downgrade+0x6d0/0x6d0 [ 1150.816298] get_user_pages_remote+0x63/0x90 [ 1150.816764] get_arg_page+0xba/0x200 [ 1150.817151] ? acct_arg_size+0xe0/0xe0 [ 1150.817547] ? downgrade_write+0x3a0/0x3a0 [ 1150.817984] ? count.constprop.0+0x1b3/0x290 [ 1150.818451] copy_string_kernel+0x1b4/0x450 [ 1150.818911] do_execveat_common+0x525/0x8d0 [ 1150.819367] ? bprm_execve+0x1960/0x1960 [ 1150.819809] __x64_sys_execveat+0xed/0x140 [ 1150.820249] do_syscall_64+0x33/0x40 [ 1150.820632] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1150.821156] RIP: 0033:0x7f1d9af7cb19 [ 1150.821548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1150.823392] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1150.824169] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1150.824890] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1150.825617] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1150.826353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1150.827069] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1150.827826] CPU: 1 PID: 13129 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1150.828466] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1150.829135] Call Trace: [ 1150.829371] dump_stack+0x107/0x167 [ 1150.829689] should_fail.cold+0x5/0xa [ 1150.830019] ? create_object.isra.0+0x3a/0xa20 [ 1150.830407] should_failslab+0x5/0x20 [ 1150.830729] kmem_cache_alloc+0x5b/0x310 [ 1150.831064] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1150.831527] create_object.isra.0+0x3a/0xa20 [ 1150.831892] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1150.832360] kmem_cache_alloc+0x159/0x310 [ 1150.832729] security_file_alloc+0x34/0x170 [ 1150.833088] __alloc_file+0xb7/0x320 [ 1150.833408] alloc_empty_file+0x6d/0x170 [ 1150.833765] path_openat+0xe6/0x2770 [ 1150.834085] ? lock_chain_count+0x20/0x20 [ 1150.834436] ? stack_trace_consume_entry+0x160/0x160 [ 1150.834854] ? path_lookupat+0x860/0x860 [ 1150.835196] ? kasan_save_stack+0x32/0x40 [ 1150.835543] ? kasan_save_stack+0x1b/0x40 [ 1150.835899] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1150.836324] ? security_prepare_creds+0x112/0x190 [ 1150.836724] ? prepare_creds+0x452/0x5e0 [ 1150.837053] ? prepare_exec_creds+0xd/0x260 [ 1150.837429] do_filp_open+0x190/0x3e0 [ 1150.837747] ? may_open_dev+0xf0/0xf0 [ 1150.838065] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1150.838478] ? perf_trace_lock+0x2bd/0x490 [ 1150.838838] ? __lockdep_reset_lock+0x180/0x180 [ 1150.839230] ? find_held_lock+0x2c/0x110 [ 1150.839575] do_open_execat+0x116/0x750 [ 1150.839905] ? bprm_execve+0x49d/0x1960 [ 1150.840231] ? __do_sys_uselib+0x680/0x680 [ 1150.840587] ? do_raw_spin_lock+0x121/0x260 [ 1150.840950] ? rwlock_bug.part.0+0x90/0x90 [ 1150.841322] bprm_execve+0x4dc/0x1960 [ 1150.841650] ? count.constprop.0+0x1b3/0x290 [ 1150.842033] ? open_exec+0x70/0x70 [ 1150.842327] ? copy_string_kernel+0x3b6/0x450 [ 1150.842711] do_execveat_common+0x772/0x8d0 [ 1150.843070] ? bprm_execve+0x1960/0x1960 [ 1150.843424] __x64_sys_execveat+0xed/0x140 [ 1150.843782] do_syscall_64+0x33/0x40 [ 1150.844095] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1150.844520] RIP: 0033:0x7fa50365eb19 [ 1150.844838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1150.846345] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1150.846973] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1150.847639] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1150.848223] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1150.848812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1150.849391] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1150.855937] FAULT_INJECTION: forcing a failure. [ 1150.855937] name failslab, interval 1, probability 0, space 0, times 0 [ 1150.857160] CPU: 1 PID: 13134 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1150.857753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1150.858423] Call Trace: [ 1150.858648] dump_stack+0x107/0x167 [ 1150.858957] should_fail.cold+0x5/0xa [ 1150.859272] ? jbd2__journal_start+0x190/0x7e0 [ 1150.859670] should_failslab+0x5/0x20 [ 1150.859991] kmem_cache_alloc+0x5b/0x310 [ 1150.860336] jbd2__journal_start+0x190/0x7e0 [ 1150.860711] __ext4_journal_start_sb+0x214/0x390 [ 1150.861113] ext4_dirty_inode+0xbc/0x130 [ 1150.861454] ? ext4_setattr+0x2160/0x2160 [ 1150.861792] __mark_inode_dirty+0x492/0xd40 [ 1150.862158] touch_atime+0x5ea/0x6e0 [ 1150.862485] ? atime_needs_update+0x600/0x600 [ 1150.862890] ? mark_page_accessed+0x125/0x10d0 [ 1150.863360] generic_file_buffered_read+0x191a/0x2920 [ 1150.863819] ? pagecache_get_page+0xc80/0xc80 [ 1150.864202] generic_file_read_iter+0x33f/0x490 [ 1150.864611] ext4_file_read_iter+0x184/0x4c0 [ 1150.864988] __kernel_read+0x593/0xb30 [ 1150.865322] ? do_sendfile+0x11e0/0x11e0 [ 1150.865680] ? fsnotify_perm.part.0+0x22d/0x620 [ 1150.866081] ? security_file_permission+0xb1/0xe0 [ 1150.866510] kernel_read+0x52/0x70 [ 1150.866817] bprm_execve+0x767/0x1960 [ 1150.867150] ? open_exec+0x70/0x70 [ 1150.867465] ? copy_string_kernel+0x3b6/0x450 [ 1150.867853] do_execveat_common+0x772/0x8d0 [ 1150.868238] ? bprm_execve+0x1960/0x1960 [ 1150.868604] __x64_sys_execveat+0xed/0x140 [ 1150.868967] do_syscall_64+0x33/0x40 [ 1150.869282] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1150.869693] RIP: 0033:0x7f3739cfbb19 [ 1150.870020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1150.871523] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1150.872160] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1150.872755] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1150.873355] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1150.873937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1150.874532] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 01:24:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:24:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:24:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) 01:24:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) 01:24:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:24:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 01:24:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 01:24:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1151.072016] FAULT_INJECTION: forcing a failure. [ 1151.072016] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.073231] CPU: 0 PID: 13529 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1151.073942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1151.074786] Call Trace: [ 1151.074854] FAULT_INJECTION: forcing a failure. [ 1151.074854] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.075065] dump_stack+0x107/0x167 [ 1151.076371] should_fail.cold+0x5/0xa [ 1151.076766] ? create_object.isra.0+0x3a/0xa20 [ 1151.077237] should_failslab+0x5/0x20 [ 1151.077628] kmem_cache_alloc+0x5b/0x310 [ 1151.078061] create_object.isra.0+0x3a/0xa20 [ 1151.078508] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1151.079039] kmem_cache_alloc+0x159/0x310 [ 1151.079471] __pmd_alloc+0x94/0x5e0 [ 1151.079851] handle_mm_fault+0x1ac4/0x3500 [ 1151.080276] ? perf_trace_lock+0x2bd/0x490 [ 1151.080710] ? __lockdep_reset_lock+0x180/0x180 [ 1151.081187] ? __pmd_alloc+0x5e0/0x5e0 [ 1151.081619] __get_user_pages+0x6ec/0x1620 [ 1151.082099] ? follow_page_mask+0x1900/0x1900 [ 1151.082557] ? __lockdep_reset_lock+0x180/0x180 [ 1151.083034] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1151.083526] __get_user_pages_remote+0x1d5/0x870 [ 1151.084014] ? lock_downgrade+0x6d0/0x6d0 [ 1151.084447] get_user_pages_remote+0x63/0x90 [ 1151.084906] get_arg_page+0xba/0x200 [ 1151.085278] ? acct_arg_size+0xe0/0xe0 [ 1151.085673] ? downgrade_write+0x3a0/0x3a0 [ 1151.086115] ? count.constprop.0+0x1b3/0x290 [ 1151.086571] copy_string_kernel+0x1b4/0x450 [ 1151.087027] do_execveat_common+0x525/0x8d0 [ 1151.087472] ? bprm_execve+0x1960/0x1960 [ 1151.087911] __x64_sys_execveat+0xed/0x140 [ 1151.088348] do_syscall_64+0x33/0x40 [ 1151.088733] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1151.089256] RIP: 0033:0x7f1d9af7cb19 [ 1151.089637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1151.091413] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1151.092185] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1151.092901] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1151.093620] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1151.094345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1151.095065] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1151.095814] CPU: 1 PID: 13562 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1151.096442] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1151.097105] Call Trace: [ 1151.097341] dump_stack+0x107/0x167 [ 1151.097730] should_fail.cold+0x5/0xa [ 1151.098064] ? __alloc_file+0x21/0x320 [ 1151.098400] should_failslab+0x5/0x20 [ 1151.098720] kmem_cache_alloc+0x5b/0x310 [ 1151.099063] __alloc_file+0x21/0x320 [ 1151.099385] alloc_empty_file+0x6d/0x170 [ 1151.099956] path_openat+0xe6/0x2770 [ 1151.100342] ? lock_chain_count+0x20/0x20 [ 1151.100696] ? stack_trace_consume_entry+0x160/0x160 [ 1151.101115] ? path_lookupat+0x860/0x860 [ 1151.101454] ? kasan_save_stack+0x32/0x40 [ 1151.101797] ? kasan_save_stack+0x1b/0x40 [ 1151.102141] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1151.102559] ? security_prepare_creds+0x112/0x190 [ 1151.102956] ? prepare_creds+0x452/0x5e0 [ 1151.103295] ? prepare_exec_creds+0xd/0x260 [ 1151.103650] do_filp_open+0x190/0x3e0 [ 1151.103973] ? may_open_dev+0xf0/0xf0 [ 1151.104292] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1151.104718] ? perf_trace_lock+0x2bd/0x490 [ 1151.105080] ? __lockdep_reset_lock+0x180/0x180 [ 1151.105474] ? find_held_lock+0x2c/0x110 [ 1151.105832] do_open_execat+0x116/0x750 [ 1151.106169] ? bprm_execve+0x49d/0x1960 [ 1151.106502] ? __do_sys_uselib+0x680/0x680 [ 1151.106851] ? do_raw_spin_lock+0x121/0x260 [ 1151.107311] ? rwlock_bug.part.0+0x90/0x90 [ 1151.107675] bprm_execve+0x4dc/0x1960 [ 1151.108004] ? count.constprop.0+0x1b3/0x290 [ 1151.108370] ? open_exec+0x70/0x70 [ 1151.108678] ? copy_string_kernel+0x3b6/0x450 [ 1151.109066] do_execveat_common+0x772/0x8d0 [ 1151.109504] ? bprm_execve+0x1960/0x1960 [ 1151.109866] __x64_sys_execveat+0xed/0x140 [ 1151.110236] do_syscall_64+0x33/0x40 [ 1151.110546] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1151.110970] RIP: 0033:0x7fa50365eb19 [ 1151.111277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1151.112789] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1151.113473] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1151.114066] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1151.114646] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1151.115238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1151.115846] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 01:24:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 01:24:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) 01:24:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 01:24:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 01:24:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 01:24:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) 01:24:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:24:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) [ 1163.893293] FAULT_INJECTION: forcing a failure. [ 1163.893293] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.895196] CPU: 0 PID: 13671 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1163.896193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.897240] FAULT_INJECTION: forcing a failure. [ 1163.897240] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1163.897362] Call Trace: [ 1163.898943] dump_stack+0x107/0x167 [ 1163.899479] should_fail.cold+0x5/0xa [ 1163.900042] ? create_object.isra.0+0x3a/0xa20 [ 1163.900708] should_failslab+0x5/0x20 [ 1163.901259] kmem_cache_alloc+0x5b/0x310 [ 1163.901860] create_object.isra.0+0x3a/0xa20 [ 1163.902511] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1163.903252] kmem_cache_alloc+0x159/0x310 [ 1163.903866] jbd2__journal_start+0x190/0x7e0 [ 1163.904517] __ext4_journal_start_sb+0x214/0x390 [ 1163.905215] ext4_dirty_inode+0xbc/0x130 [ 1163.905806] ? ext4_setattr+0x2160/0x2160 [ 1163.906408] __mark_inode_dirty+0x492/0xd40 [ 1163.907045] touch_atime+0x5ea/0x6e0 [ 1163.907591] ? atime_needs_update+0x600/0x600 [ 1163.908247] ? mark_page_accessed+0x125/0x10d0 [ 1163.908924] generic_file_buffered_read+0x191a/0x2920 [ 1163.909749] ? pagecache_get_page+0xc80/0xc80 [ 1163.910444] generic_file_read_iter+0x33f/0x490 [ 1163.911133] ext4_file_read_iter+0x184/0x4c0 [ 1163.911782] __kernel_read+0x593/0xb30 [ 1163.912355] ? do_sendfile+0x11e0/0x11e0 [ 1163.912976] ? fsnotify_perm.part.0+0x22d/0x620 [ 1163.913663] ? security_file_permission+0xb1/0xe0 [ 1163.914385] kernel_read+0x52/0x70 [ 1163.914911] bprm_execve+0x767/0x1960 [ 1163.915484] ? open_exec+0x70/0x70 [ 1163.916004] ? copy_string_kernel+0x3b6/0x450 [ 1163.916674] do_execveat_common+0x772/0x8d0 [ 1163.917311] ? bprm_execve+0x1960/0x1960 [ 1163.917935] __x64_sys_execveat+0xed/0x140 [ 1163.918569] do_syscall_64+0x33/0x40 [ 1163.919111] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1163.919847] RIP: 0033:0x7fa50365eb19 [ 1163.920385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.922983] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1163.924079] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1163.925097] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1163.926121] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1163.927139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1163.928154] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1163.929219] CPU: 1 PID: 13684 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1163.929425] hpet: Lost 1 RTC interrupts [ 1163.929938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.929951] Call Trace: [ 1163.931565] dump_stack+0x107/0x167 [ 1163.931928] should_fail.cold+0x5/0xa [ 1163.932308] __alloc_pages_nodemask+0x182/0x600 [ 1163.932775] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1163.933347] ? find_held_lock+0x2c/0x110 [ 1163.933750] ? __pmd_alloc+0x2db/0x5e0 [ 1163.934135] ? lock_downgrade+0x6d0/0x6d0 [ 1163.934543] ? do_raw_spin_lock+0x121/0x260 [ 1163.934972] alloc_pages_current+0x187/0x280 [ 1163.935407] pte_alloc_one+0x16/0x1a0 [ 1163.935778] __pte_alloc+0x1d/0x330 [ 1163.936140] handle_mm_fault+0x287f/0x3500 [ 1163.936556] ? perf_trace_lock+0x2bd/0x490 [ 1163.936968] ? __lockdep_reset_lock+0x180/0x180 [ 1163.937422] ? __pmd_alloc+0x5e0/0x5e0 [ 1163.937826] __get_user_pages+0x6ec/0x1620 [ 1163.938261] ? follow_page_mask+0x1900/0x1900 [ 1163.938698] ? __lockdep_reset_lock+0x180/0x180 [ 1163.939148] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1163.939620] __get_user_pages_remote+0x1d5/0x870 [ 1163.940081] ? lock_downgrade+0x6d0/0x6d0 [ 1163.940599] get_user_pages_remote+0x63/0x90 [ 1163.941035] get_arg_page+0xba/0x200 [ 1163.941393] ? acct_arg_size+0xe0/0xe0 [ 1163.941767] ? downgrade_write+0x3a0/0x3a0 [ 1163.942187] ? count.constprop.0+0x1b3/0x290 [ 1163.942620] copy_string_kernel+0x1b4/0x450 [ 1163.943049] do_execveat_common+0x525/0x8d0 [ 1163.943470] ? bprm_execve+0x1960/0x1960 [ 1163.943881] __x64_sys_execveat+0xed/0x140 [ 1163.944297] do_syscall_64+0x33/0x40 [ 1163.944661] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1163.945155] RIP: 0033:0x7f1d9af7cb19 [ 1163.945511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.947223] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1163.947949] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1163.948629] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1163.949295] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1163.949979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1163.950666] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1163.964727] FAULT_INJECTION: forcing a failure. [ 1163.964727] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.965958] CPU: 1 PID: 13680 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1163.966632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.967419] Call Trace: [ 1163.967686] dump_stack+0x107/0x167 [ 1163.968050] should_fail.cold+0x5/0xa [ 1163.968430] ? create_object.isra.0+0x3a/0xa20 [ 1163.968877] should_failslab+0x5/0x20 [ 1163.969244] kmem_cache_alloc+0x5b/0x310 [ 1163.969653] create_object.isra.0+0x3a/0xa20 [ 1163.970075] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1163.970575] kmem_cache_alloc+0x159/0x310 [ 1163.970992] jbd2__journal_start+0x190/0x7e0 [ 1163.971430] __ext4_journal_start_sb+0x214/0x390 [ 1163.972008] ext4_dirty_inode+0xbc/0x130 [ 1163.972397] ? ext4_setattr+0x2160/0x2160 [ 1163.972793] __mark_inode_dirty+0x492/0xd40 [ 1163.973216] touch_atime+0x5ea/0x6e0 [ 1163.973576] ? atime_needs_update+0x600/0x600 [ 1163.974015] ? mark_page_accessed+0x125/0x10d0 [ 1163.974469] generic_file_buffered_read+0x191a/0x2920 [ 1163.974997] ? pagecache_get_page+0xc80/0xc80 [ 1163.975447] generic_file_read_iter+0x33f/0x490 [ 1163.975904] ext4_file_read_iter+0x184/0x4c0 [ 1163.976333] __kernel_read+0x593/0xb30 [ 1163.976713] ? do_sendfile+0x11e0/0x11e0 [ 1163.977121] ? fsnotify_perm.part.0+0x22d/0x620 [ 1163.977578] ? security_file_permission+0xb1/0xe0 [ 1163.978050] kernel_read+0x52/0x70 [ 1163.978404] bprm_execve+0x767/0x1960 [ 1163.978785] ? open_exec+0x70/0x70 [ 1163.979129] ? copy_string_kernel+0x3b6/0x450 [ 1163.979577] do_execveat_common+0x772/0x8d0 [ 1163.979999] ? bprm_execve+0x1960/0x1960 [ 1163.980418] __x64_sys_execveat+0xed/0x140 [ 1163.980832] do_syscall_64+0x33/0x40 [ 1163.981189] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1163.981687] RIP: 0033:0x7f3739cfbb19 [ 1163.982044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.983786] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1163.984511] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1163.985177] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1163.985848] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1163.986537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1163.987240] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1163.993835] FAULT_INJECTION: forcing a failure. [ 1163.993835] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.994958] CPU: 1 PID: 13726 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1163.995630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.996398] Call Trace: [ 1163.996641] dump_stack+0x107/0x167 [ 1163.996988] should_fail.cold+0x5/0xa [ 1163.997353] ? getname_flags.part.0+0x50/0x4f0 [ 1163.997787] should_failslab+0x5/0x20 [ 1163.998149] kmem_cache_alloc+0x5b/0x310 [ 1163.998538] getname_flags.part.0+0x50/0x4f0 [ 1163.998951] getname_flags+0x9a/0xe0 [ 1163.999305] __x64_sys_execveat+0xd6/0x140 [ 1163.999712] do_syscall_64+0x33/0x40 [ 1164.000065] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1164.000538] RIP: 0033:0x7f1b403e0b19 [ 1164.000891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1164.002598] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1164.003418] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1164.004070] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1164.004732] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1164.005391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1164.006040] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:24:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) [ 1164.124322] FAULT_INJECTION: forcing a failure. [ 1164.124322] name failslab, interval 1, probability 0, space 0, times 0 [ 1164.125406] CPU: 1 PID: 13994 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1164.126026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1164.126757] Call Trace: [ 1164.126998] dump_stack+0x107/0x167 [ 1164.127326] should_fail.cold+0x5/0xa [ 1164.127674] ? ptlock_alloc+0x1d/0x70 [ 1164.128083] should_failslab+0x5/0x20 [ 1164.128430] kmem_cache_alloc+0x5b/0x310 [ 1164.128800] ptlock_alloc+0x1d/0x70 [ 1164.129126] pte_alloc_one+0x68/0x1a0 [ 1164.129464] __pte_alloc+0x1d/0x330 [ 1164.129794] handle_mm_fault+0x287f/0x3500 [ 1164.130189] ? perf_trace_lock+0x2bd/0x490 [ 1164.130565] ? __lockdep_reset_lock+0x180/0x180 [ 1164.130984] ? __pmd_alloc+0x5e0/0x5e0 [ 1164.131357] __get_user_pages+0x6ec/0x1620 [ 1164.131748] ? follow_page_mask+0x1900/0x1900 [ 1164.132149] ? __lockdep_reset_lock+0x180/0x180 [ 1164.132561] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1164.132991] __get_user_pages_remote+0x1d5/0x870 [ 1164.133414] ? lock_downgrade+0x6d0/0x6d0 [ 1164.133790] get_user_pages_remote+0x63/0x90 [ 1164.134195] get_arg_page+0xba/0x200 [ 1164.134524] ? acct_arg_size+0xe0/0xe0 [ 1164.134875] ? downgrade_write+0x3a0/0x3a0 [ 1164.135254] ? count.constprop.0+0x1b3/0x290 [ 1164.135652] copy_string_kernel+0x1b4/0x450 [ 1164.136042] do_execveat_common+0x525/0x8d0 [ 1164.136435] ? bprm_execve+0x1960/0x1960 [ 1164.136814] __x64_sys_execveat+0xed/0x140 [ 1164.137198] do_syscall_64+0x33/0x40 [ 1164.137531] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1164.137992] RIP: 0033:0x7f1d9af7cb19 [ 1164.138329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1164.139934] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1164.140600] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1164.141220] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1164.141838] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1164.142464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1164.143075] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:24:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) 01:24:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 01:24:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 01:24:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) 01:24:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:24:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 01:24:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 01:24:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) [ 1177.583851] FAULT_INJECTION: forcing a failure. [ 1177.583851] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.585542] CPU: 1 PID: 14001 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1177.586562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.587774] Call Trace: [ 1177.588178] dump_stack+0x107/0x167 [ 1177.588727] should_fail.cold+0x5/0xa [ 1177.589299] ? create_object.isra.0+0x3a/0xa20 [ 1177.589980] should_failslab+0x5/0x20 [ 1177.590558] kmem_cache_alloc+0x5b/0x310 [ 1177.591186] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1177.592077] create_object.isra.0+0x3a/0xa20 [ 1177.592725] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1177.593478] kmem_cache_alloc+0x159/0x310 [ 1177.594110] ptlock_alloc+0x1d/0x70 [ 1177.594666] pte_alloc_one+0x68/0x1a0 [ 1177.595236] __pte_alloc+0x1d/0x330 [ 1177.595785] handle_mm_fault+0x287f/0x3500 [ 1177.596422] ? perf_trace_lock+0x2bd/0x490 [ 1177.597055] ? __lockdep_reset_lock+0x180/0x180 [ 1177.597744] ? __pmd_alloc+0x5e0/0x5e0 [ 1177.598381] __get_user_pages+0x6ec/0x1620 [ 1177.598833] FAULT_INJECTION: forcing a failure. [ 1177.598833] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.599033] ? follow_page_mask+0x1900/0x1900 [ 1177.601282] ? __lockdep_reset_lock+0x180/0x180 [ 1177.601967] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1177.602700] __get_user_pages_remote+0x1d5/0x870 [ 1177.603398] ? lock_downgrade+0x6d0/0x6d0 [ 1177.604026] get_user_pages_remote+0x63/0x90 [ 1177.604679] get_arg_page+0xba/0x200 [ 1177.605236] ? acct_arg_size+0xe0/0xe0 [ 1177.605809] ? downgrade_write+0x3a0/0x3a0 [ 1177.606444] ? count.constprop.0+0x1b3/0x290 [ 1177.607176] copy_string_kernel+0x1b4/0x450 [ 1177.607831] do_execveat_common+0x525/0x8d0 [ 1177.608476] ? bprm_execve+0x1960/0x1960 [ 1177.609109] __x64_sys_execveat+0xed/0x140 [ 1177.609733] do_syscall_64+0x33/0x40 [ 1177.610294] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1177.611046] RIP: 0033:0x7f1d9af7cb19 [ 1177.611587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.614242] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1177.615360] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1177.616395] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1177.617437] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.618479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1177.619512] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1177.620602] CPU: 0 PID: 14011 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1177.621613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.622836] Call Trace: [ 1177.623228] dump_stack+0x107/0x167 [ 1177.623761] should_fail.cold+0x5/0xa [ 1177.624322] ? create_object.isra.0+0x3a/0xa20 [ 1177.624991] should_failslab+0x5/0x20 [ 1177.625548] kmem_cache_alloc+0x5b/0x310 [ 1177.626154] create_object.isra.0+0x3a/0xa20 [ 1177.626811] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1177.627554] kmem_cache_alloc+0x159/0x310 [ 1177.628161] getname_flags.part.0+0x50/0x4f0 [ 1177.628800] getname_flags+0x9a/0xe0 [ 1177.629349] __x64_sys_execveat+0xd6/0x140 [ 1177.629969] do_syscall_64+0x33/0x40 [ 1177.630518] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1177.631257] RIP: 0033:0x7f1b403e0b19 [ 1177.631795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.634428] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1177.635525] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1177.636548] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1177.637572] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.638602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1177.639629] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1177.640763] hpet: Lost 1 RTC interrupts [ 1177.642105] FAULT_INJECTION: forcing a failure. [ 1177.642105] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.643841] CPU: 1 PID: 14015 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1177.644865] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.646068] Call Trace: [ 1177.646478] dump_stack+0x107/0x167 [ 1177.647028] should_fail.cold+0x5/0xa [ 1177.647594] ? load_elf_phdrs+0x103/0x210 [ 1177.648212] should_failslab+0x5/0x20 [ 1177.648775] __kmalloc+0x72/0x390 [ 1177.649306] load_elf_phdrs+0x103/0x210 [ 1177.649896] ? set_brk+0x180/0x180 [ 1177.650452] load_elf_binary+0x1ef/0x4bc0 [ 1177.651101] ? lock_acquire+0x197/0x470 [ 1177.651681] ? find_held_lock+0x2c/0x110 [ 1177.652296] ? bprm_execve+0x82d/0x1960 [ 1177.652879] ? elf_core_dump+0x37e0/0x37e0 [ 1177.653509] ? do_raw_read_unlock+0x3b/0x70 [ 1177.654233] ? _raw_read_unlock+0x1a/0x30 [ 1177.654845] ? load_misc_binary+0x605/0xb70 [ 1177.655506] bprm_execve+0x84e/0x1960 [ 1177.656092] ? open_exec+0x70/0x70 [ 1177.656623] ? copy_string_kernel+0x3b6/0x450 [ 1177.657311] do_execveat_common+0x772/0x8d0 [ 1177.657963] ? bprm_execve+0x1960/0x1960 [ 1177.658606] __x64_sys_execveat+0xed/0x140 [ 1177.659246] do_syscall_64+0x33/0x40 [ 1177.659800] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1177.660549] RIP: 0033:0x7fa50365eb19 [ 1177.661104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.663725] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1177.664844] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1177.665889] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1177.666943] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.667982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1177.669021] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1177.673424] FAULT_INJECTION: forcing a failure. [ 1177.673424] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.675121] CPU: 1 PID: 14016 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1177.676146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.677356] Call Trace: [ 1177.677754] dump_stack+0x107/0x167 [ 1177.678308] should_fail.cold+0x5/0xa [ 1177.678881] ? load_elf_phdrs+0x103/0x210 [ 1177.679503] should_failslab+0x5/0x20 [ 1177.680067] __kmalloc+0x72/0x390 [ 1177.680599] load_elf_phdrs+0x103/0x210 [ 1177.681190] ? set_brk+0x180/0x180 [ 1177.681740] load_elf_binary+0x1ef/0x4bc0 [ 1177.682395] ? lock_acquire+0x197/0x470 [ 1177.682990] ? find_held_lock+0x2c/0x110 [ 1177.683607] ? bprm_execve+0x82d/0x1960 [ 1177.684201] ? elf_core_dump+0x37e0/0x37e0 [ 1177.684823] ? do_raw_read_unlock+0x3b/0x70 [ 1177.685534] ? _raw_read_unlock+0x1a/0x30 [ 1177.686150] ? load_misc_binary+0x605/0xb70 [ 1177.686819] bprm_execve+0x84e/0x1960 [ 1177.687405] ? open_exec+0x70/0x70 [ 1177.687937] ? copy_string_kernel+0x3b6/0x450 [ 1177.688614] do_execveat_common+0x772/0x8d0 [ 1177.689262] ? bprm_execve+0x1960/0x1960 [ 1177.689897] __x64_sys_execveat+0xed/0x140 [ 1177.690539] do_syscall_64+0x33/0x40 [ 1177.691093] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1177.691836] RIP: 0033:0x7f3739cfbb19 [ 1177.692386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.695043] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1177.696158] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1177.697194] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1177.698243] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.699286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1177.700323] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 01:24:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:24:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) 01:24:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 01:24:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 01:24:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 01:24:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 01:24:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 01:24:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) [ 1177.966355] FAULT_INJECTION: forcing a failure. [ 1177.966355] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.968078] CPU: 1 PID: 14355 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1177.969093] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.970310] Call Trace: [ 1177.970714] dump_stack+0x107/0x167 [ 1177.971261] should_fail.cold+0x5/0xa [ 1177.971830] ? load_elf_phdrs+0x103/0x210 [ 1177.972450] should_failslab+0x5/0x20 [ 1177.973018] __kmalloc+0x72/0x390 [ 1177.973556] load_elf_phdrs+0x103/0x210 [ 1177.974147] ? set_brk+0x180/0x180 [ 1177.974708] load_elf_binary+0x1ef/0x4bc0 [ 1177.975355] ? lock_acquire+0x197/0x470 [ 1177.975943] ? find_held_lock+0x2c/0x110 [ 1177.976552] ? bprm_execve+0x82d/0x1960 [ 1177.977146] ? elf_core_dump+0x37e0/0x37e0 [ 1177.977783] ? do_raw_read_unlock+0x3b/0x70 [ 1177.978426] ? _raw_read_unlock+0x1a/0x30 [ 1177.979040] ? load_misc_binary+0x605/0xb70 [ 1177.979691] bprm_execve+0x84e/0x1960 [ 1177.980280] ? open_exec+0x70/0x70 [ 1177.980804] ? copy_string_kernel+0x3b6/0x450 [ 1177.981509] do_execveat_common+0x772/0x8d0 [ 1177.982240] ? bprm_execve+0x1960/0x1960 [ 1177.982876] __x64_sys_execveat+0xed/0x140 [ 1177.983511] do_syscall_64+0x33/0x40 [ 1177.984065] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1177.984805] RIP: 0033:0x7fa50365eb19 [ 1177.985367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.988026] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1177.989138] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1177.990169] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1177.991208] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.992245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1177.993279] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1178.027010] FAULT_INJECTION: forcing a failure. [ 1178.027010] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.028757] CPU: 1 PID: 14488 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1178.029794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.031034] Call Trace: [ 1178.031452] dump_stack+0x107/0x167 [ 1178.032031] should_fail.cold+0x5/0xa [ 1178.032615] ? __anon_vma_prepare+0x62/0x500 [ 1178.033269] should_failslab+0x5/0x20 [ 1178.033835] kmem_cache_alloc+0x5b/0x310 [ 1178.034462] __anon_vma_prepare+0x62/0x500 [ 1178.035089] ? __pte_alloc+0x194/0x330 [ 1178.035666] handle_mm_fault+0x2b2d/0x3500 [ 1178.036301] ? perf_trace_lock+0x2bd/0x490 [ 1178.036929] ? __lockdep_reset_lock+0x180/0x180 [ 1178.037618] ? __pmd_alloc+0x5e0/0x5e0 [ 1178.038270] __get_user_pages+0x6ec/0x1620 [ 1178.038925] ? follow_page_mask+0x1900/0x1900 [ 1178.039590] ? __lockdep_reset_lock+0x180/0x180 [ 1178.040273] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1178.040990] __get_user_pages_remote+0x1d5/0x870 [ 1178.041693] ? lock_downgrade+0x6d0/0x6d0 [ 1178.042329] get_user_pages_remote+0x63/0x90 [ 1178.042996] get_arg_page+0xba/0x200 [ 1178.043545] ? acct_arg_size+0xe0/0xe0 [ 1178.044113] ? downgrade_write+0x3a0/0x3a0 [ 1178.044835] ? count.constprop.0+0x1b3/0x290 [ 1178.045494] copy_string_kernel+0x1b4/0x450 [ 1178.046147] do_execveat_common+0x525/0x8d0 [ 1178.046792] ? bprm_execve+0x1960/0x1960 [ 1178.047430] __x64_sys_execveat+0xed/0x140 [ 1178.047828] FAULT_INJECTION: forcing a failure. [ 1178.047828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1178.048063] do_syscall_64+0x33/0x40 [ 1178.048090] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1178.050999] RIP: 0033:0x7f1d9af7cb19 [ 1178.051549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.054207] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1178.055334] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1178.056371] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1178.057415] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1178.058462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1178.059501] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1178.060653] CPU: 0 PID: 14543 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1178.061660] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.062856] Call Trace: [ 1178.063246] dump_stack+0x107/0x167 [ 1178.063777] should_fail.cold+0x5/0xa [ 1178.064338] strncpy_from_user+0x34/0x470 [ 1178.064942] getname_flags.part.0+0x95/0x4f0 [ 1178.065578] getname_flags+0x9a/0xe0 [ 1178.066126] __x64_sys_execveat+0xd6/0x140 [ 1178.066752] do_syscall_64+0x33/0x40 [ 1178.067296] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1178.068033] RIP: 0033:0x7f1b403e0b19 [ 1178.068574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.071208] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1178.072299] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1178.073314] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1178.074342] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1178.075361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1178.075468] FAULT_INJECTION: forcing a failure. [ 1178.075468] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.076404] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1178.079222] CPU: 1 PID: 14520 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1178.080238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.081445] Call Trace: [ 1178.081844] dump_stack+0x107/0x167 [ 1178.082406] should_fail.cold+0x5/0xa [ 1178.082978] ? create_object.isra.0+0x3a/0xa20 [ 1178.083661] should_failslab+0x5/0x20 [ 1178.084225] kmem_cache_alloc+0x5b/0x310 [ 1178.084841] create_object.isra.0+0x3a/0xa20 [ 1178.085493] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1178.086259] __kmalloc+0x16e/0x390 [ 1178.086802] load_elf_phdrs+0x103/0x210 [ 1178.087392] ? set_brk+0x180/0x180 [ 1178.087947] load_elf_binary+0x1ef/0x4bc0 [ 1178.088589] ? lock_acquire+0x197/0x470 [ 1178.089179] ? find_held_lock+0x2c/0x110 [ 1178.089793] ? bprm_execve+0x82d/0x1960 [ 1178.090392] ? elf_core_dump+0x37e0/0x37e0 [ 1178.091026] ? do_raw_read_unlock+0x3b/0x70 [ 1178.091725] ? _raw_read_unlock+0x1a/0x30 [ 1178.092332] ? load_misc_binary+0x605/0xb70 [ 1178.092991] bprm_execve+0x84e/0x1960 [ 1178.093574] ? open_exec+0x70/0x70 [ 1178.094100] ? copy_string_kernel+0x3b6/0x450 [ 1178.094790] do_execveat_common+0x772/0x8d0 [ 1178.095437] ? bprm_execve+0x1960/0x1960 [ 1178.096075] __x64_sys_execveat+0xed/0x140 [ 1178.096709] do_syscall_64+0x33/0x40 [ 1178.097261] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1178.098009] RIP: 0033:0x7f3739cfbb19 [ 1178.098567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.101214] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1178.102329] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1178.103366] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1178.104403] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1178.105438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1178.106478] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 01:24:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 01:24:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:24:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 01:24:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 01:24:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 01:24:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) 01:24:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) [ 1178.357124] FAULT_INJECTION: forcing a failure. [ 1178.357124] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.358851] CPU: 1 PID: 14906 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1178.359867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.360948] FAULT_INJECTION: forcing a failure. [ 1178.360948] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.361073] Call Trace: [ 1178.361111] dump_stack+0x107/0x167 [ 1178.363486] should_fail.cold+0x5/0xa [ 1178.364068] ? __request_module+0x2e0/0x920 [ 1178.364711] ? bprm_execve+0x9a0/0x1960 [ 1178.365302] should_failslab+0x5/0x20 [ 1178.365869] kmem_cache_alloc_trace+0x55/0x320 [ 1178.366565] ? bprm_execve+0x9a0/0x1960 [ 1178.367154] __request_module+0x2e0/0x920 [ 1178.367779] ? free_modprobe_argv+0x90/0x90 [ 1178.368423] ? __lockdep_reset_lock+0x180/0x180 [ 1178.369130] ? find_held_lock+0x2c/0x110 [ 1178.369750] ? bprm_execve+0x8f8/0x1960 [ 1178.370350] ? lock_downgrade+0x6d0/0x6d0 [ 1178.370967] ? elf_core_dump+0x3c50/0x3c50 [ 1178.371598] ? do_raw_read_unlock+0x3b/0x70 [ 1178.372236] ? _raw_read_unlock+0x1a/0x30 [ 1178.372910] ? load_misc_binary+0x605/0xb70 [ 1178.373573] bprm_execve+0x9a0/0x1960 [ 1178.374161] ? open_exec+0x70/0x70 [ 1178.374700] ? copy_string_kernel+0x3b6/0x450 [ 1178.375390] do_execveat_common+0x772/0x8d0 [ 1178.376036] ? bprm_execve+0x1960/0x1960 [ 1178.376680] __x64_sys_execveat+0xed/0x140 [ 1178.377316] do_syscall_64+0x33/0x40 [ 1178.377868] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1178.378623] RIP: 0033:0x7fa50365eb19 [ 1178.379171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.381818] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1178.382941] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1178.383980] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1178.385017] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1178.386052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1178.387096] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1178.388282] CPU: 0 PID: 14909 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1178.389188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.390271] Call Trace: [ 1178.390623] dump_stack+0x107/0x167 [ 1178.391100] should_fail.cold+0x5/0xa [ 1178.391614] ? alloc_bprm+0x51/0x8f0 [ 1178.392109] ? alloc_bprm+0x51/0x8f0 [ 1178.392608] should_failslab+0x5/0x20 [ 1178.393109] kmem_cache_alloc_trace+0x55/0x320 [ 1178.393711] ? lock_downgrade+0x6d0/0x6d0 [ 1178.394258] alloc_bprm+0x51/0x8f0 [ 1178.394715] ? __virt_addr_valid+0x170/0x5d0 [ 1178.395290] do_execveat_common+0x275/0x8d0 [ 1178.395848] ? strncpy_from_user+0x9e/0x470 [ 1178.396409] ? bprm_execve+0x1960/0x1960 [ 1178.396949] __x64_sys_execveat+0xed/0x140 [ 1178.397497] do_syscall_64+0x33/0x40 [ 1178.397983] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1178.398649] RIP: 0033:0x7f1b403e0b19 [ 1178.399131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.401448] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1178.402432] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1178.403346] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1178.404279] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1178.405194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1178.406107] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1178.416908] FAULT_INJECTION: forcing a failure. [ 1178.416908] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.418619] CPU: 1 PID: 14925 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1178.419750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.420961] Call Trace: [ 1178.421357] dump_stack+0x107/0x167 [ 1178.421902] should_fail.cold+0x5/0xa [ 1178.422479] ? __request_module+0x2e0/0x920 [ 1178.423120] ? bprm_execve+0x9a0/0x1960 [ 1178.423707] should_failslab+0x5/0x20 [ 1178.424270] kmem_cache_alloc_trace+0x55/0x320 [ 1178.424959] ? bprm_execve+0x9a0/0x1960 [ 1178.425545] __request_module+0x2e0/0x920 [ 1178.426168] ? free_modprobe_argv+0x90/0x90 [ 1178.426817] ? __lockdep_reset_lock+0x180/0x180 [ 1178.427521] ? find_held_lock+0x2c/0x110 [ 1178.428132] ? bprm_execve+0x8f8/0x1960 [ 1178.428727] ? lock_downgrade+0x6d0/0x6d0 [ 1178.429335] ? elf_core_dump+0x3c50/0x3c50 [ 1178.429963] ? do_raw_read_unlock+0x3b/0x70 [ 1178.430603] ? _raw_read_unlock+0x1a/0x30 [ 1178.431209] ? load_misc_binary+0x605/0xb70 [ 1178.431866] bprm_execve+0x9a0/0x1960 [ 1178.432450] ? open_exec+0x70/0x70 [ 1178.432984] ? copy_string_kernel+0x3b6/0x450 [ 1178.433671] do_execveat_common+0x772/0x8d0 [ 1178.434325] ? bprm_execve+0x1960/0x1960 [ 1178.434964] __x64_sys_execveat+0xed/0x140 [ 1178.435610] do_syscall_64+0x33/0x40 [ 1178.436165] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1178.436918] RIP: 0033:0x7f3739cfbb19 [ 1178.437470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.440141] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1178.441262] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1178.442317] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1178.443349] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1178.444388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1178.445432] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 01:24:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 01:24:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 01:24:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:24:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) [ 1192.252410] FAULT_INJECTION: forcing a failure. [ 1192.252410] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.254610] CPU: 0 PID: 15290 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1192.255875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1192.257370] Call Trace: [ 1192.257871] dump_stack+0x107/0x167 [ 1192.258559] should_fail.cold+0x5/0xa [ 1192.259264] ? create_object.isra.0+0x3a/0xa20 [ 1192.260106] should_failslab+0x5/0x20 [ 1192.260808] kmem_cache_alloc+0x5b/0x310 [ 1192.261584] create_object.isra.0+0x3a/0xa20 [ 1192.262420] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1192.263350] kmem_cache_alloc+0x159/0x310 [ 1192.264128] __anon_vma_prepare+0x62/0x500 [ 1192.264899] ? __pte_alloc+0x194/0x330 [ 1192.265540] handle_mm_fault+0x2b2d/0x3500 [ 1192.266308] ? perf_trace_lock+0x2bd/0x490 [ 1192.267104] ? __lockdep_reset_lock+0x180/0x180 [ 1192.267955] ? __pmd_alloc+0x5e0/0x5e0 [ 1192.268950] __get_user_pages+0x6ec/0x1620 [ 1192.269746] ? follow_page_mask+0x1900/0x1900 [ 1192.270584] ? __lockdep_reset_lock+0x180/0x180 [ 1192.271428] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1192.272324] __get_user_pages_remote+0x1d5/0x870 [ 1192.272341] FAULT_INJECTION: forcing a failure. [ 1192.272341] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.274826] ? lock_downgrade+0x6d0/0x6d0 [ 1192.275463] get_user_pages_remote+0x63/0x90 [ 1192.276132] get_arg_page+0xba/0x200 [ 1192.276695] ? acct_arg_size+0xe0/0xe0 [ 1192.277266] ? downgrade_write+0x3a0/0x3a0 [ 1192.277899] ? count.constprop.0+0x1b3/0x290 [ 1192.278575] copy_string_kernel+0x1b4/0x450 [ 1192.279234] do_execveat_common+0x525/0x8d0 [ 1192.279888] ? bprm_execve+0x1960/0x1960 [ 1192.280526] __x64_sys_execveat+0xed/0x140 [ 1192.281164] do_syscall_64+0x33/0x40 [ 1192.281723] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1192.282494] RIP: 0033:0x7f1d9af7cb19 [ 1192.283048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1192.285749] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1192.286887] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1192.287933] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1192.288983] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1192.290037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1192.291100] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1192.292195] CPU: 1 PID: 15298 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1192.292498] hpet: Lost 1 RTC interrupts [ 1192.293019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1192.293033] Call Trace: [ 1192.294770] dump_stack+0x107/0x167 [ 1192.295132] should_fail.cold+0x5/0xa [ 1192.295507] ? create_object.isra.0+0x3a/0xa20 01:24:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) 01:24:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 01:24:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xaf2) 01:24:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:24:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 01:24:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) 01:24:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 01:24:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f0) [ 1192.296000] should_failslab+0x5/0x20 [ 1192.296525] kmem_cache_alloc+0x5b/0x310 [ 1192.296987] create_object.isra.0+0x3a/0xa20 [ 1192.297416] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1192.297923] kmem_cache_alloc_trace+0x151/0x320 [ 1192.298400] ? bprm_execve+0x9a0/0x1960 [ 1192.298798] __request_module+0x2e0/0x920 [ 1192.299211] ? free_modprobe_argv+0x90/0x90 [ 1192.299642] ? __lockdep_reset_lock+0x180/0x180 [ 1192.300110] ? find_held_lock+0x2c/0x110 [ 1192.300524] ? bprm_execve+0x8f8/0x1960 [ 1192.300922] ? lock_downgrade+0x6d0/0x6d0 [ 1192.301330] ? elf_core_dump+0x3c50/0x3c50 [ 1192.301750] ? do_raw_read_unlock+0x3b/0x70 [ 1192.302171] ? _raw_read_unlock+0x1a/0x30 [ 1192.302582] ? load_misc_binary+0x605/0xb70 [ 1192.303013] bprm_execve+0x9a0/0x1960 [ 1192.303405] ? open_exec+0x70/0x70 [ 1192.303760] ? copy_string_kernel+0x3b6/0x450 [ 1192.304213] do_execveat_common+0x772/0x8d0 [ 1192.304643] ? bprm_execve+0x1960/0x1960 [ 1192.305065] __x64_sys_execveat+0xed/0x140 [ 1192.305493] do_syscall_64+0x33/0x40 [ 1192.305859] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1192.306374] RIP: 0033:0x7f3739cfbb19 [ 1192.306749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1192.308516] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1192.309360] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1192.310052] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1192.310745] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1192.311427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1192.312115] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1192.330822] FAULT_INJECTION: forcing a failure. [ 1192.330822] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.332611] CPU: 0 PID: 15303 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1192.333639] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1192.334874] Call Trace: [ 1192.335271] dump_stack+0x107/0x167 [ 1192.335814] should_fail.cold+0x5/0xa [ 1192.336382] ? create_object.isra.0+0x3a/0xa20 [ 1192.337066] should_failslab+0x5/0x20 [ 1192.337638] kmem_cache_alloc+0x5b/0x310 [ 1192.338245] create_object.isra.0+0x3a/0xa20 [ 1192.338917] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1192.339677] kmem_cache_alloc_trace+0x151/0x320 [ 1192.340399] ? lock_downgrade+0x6d0/0x6d0 [ 1192.341024] alloc_bprm+0x51/0x8f0 [ 1192.341529] ? __virt_addr_valid+0x170/0x5d0 [ 1192.342193] do_execveat_common+0x275/0x8d0 [ 1192.342881] ? strncpy_from_user+0x9e/0x470 [ 1192.343517] ? bprm_execve+0x1960/0x1960 [ 1192.344140] __x64_sys_execveat+0xed/0x140 [ 1192.344775] do_syscall_64+0x33/0x40 [ 1192.345328] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1192.346084] RIP: 0033:0x7f1b403e0b19 [ 1192.346649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1192.349341] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1192.350420] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1192.351477] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1192.352535] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1192.353590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1192.354643] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1192.355812] hpet: Lost 1 RTC interrupts [ 1192.368932] FAULT_INJECTION: forcing a failure. [ 1192.368932] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.370033] CPU: 1 PID: 15324 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1192.370712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1192.371588] Call Trace: [ 1192.371850] dump_stack+0x107/0x167 [ 1192.372206] should_fail.cold+0x5/0xa [ 1192.372588] ? create_object.isra.0+0x3a/0xa20 [ 1192.373040] should_failslab+0x5/0x20 [ 1192.373406] kmem_cache_alloc+0x5b/0x310 [ 1192.373810] create_object.isra.0+0x3a/0xa20 [ 1192.374228] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1192.374733] kmem_cache_alloc_trace+0x151/0x320 [ 1192.375189] ? bprm_execve+0x9a0/0x1960 [ 1192.375573] __request_module+0x2e0/0x920 [ 1192.375974] ? free_modprobe_argv+0x90/0x90 [ 1192.376385] ? __lockdep_reset_lock+0x180/0x180 [ 1192.376848] ? find_held_lock+0x2c/0x110 [ 1192.377246] ? bprm_execve+0x8f8/0x1960 [ 1192.377630] ? lock_downgrade+0x6d0/0x6d0 [ 1192.378026] ? elf_core_dump+0x3c50/0x3c50 [ 1192.378439] ? do_raw_read_unlock+0x3b/0x70 [ 1192.378854] ? _raw_read_unlock+0x1a/0x30 [ 1192.379246] ? load_misc_binary+0x605/0xb70 [ 1192.379675] bprm_execve+0x9a0/0x1960 [ 1192.380058] ? open_exec+0x70/0x70 [ 1192.380408] ? copy_string_kernel+0x3b6/0x450 [ 1192.380856] do_execveat_common+0x772/0x8d0 [ 1192.381271] ? bprm_execve+0x1960/0x1960 [ 1192.381681] __x64_sys_execveat+0xed/0x140 [ 1192.382092] do_syscall_64+0x33/0x40 [ 1192.382452] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1192.382933] RIP: 0033:0x7fa50365eb19 [ 1192.383287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1192.385005] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1192.385723] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1192.386391] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1192.387175] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1192.387838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1192.388501] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 01:25:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 01:25:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 1206.557782] FAULT_INJECTION: forcing a failure. [ 1206.557782] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1206.558930] CPU: 0 PID: 15624 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1206.559572] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.560332] Call Trace: [ 1206.560587] dump_stack+0x107/0x167 [ 1206.560932] should_fail.cold+0x5/0xa [ 1206.561296] __alloc_pages_nodemask+0x182/0x600 [ 1206.561767] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1206.562345] alloc_pages_current+0x187/0x280 [ 1206.562765] allocate_slab+0x26f/0x380 [ 1206.563132] ___slab_alloc+0x470/0x700 [ 1206.563501] ? create_object.isra.0+0x3a/0xa20 [ 1206.563929] ? lock_acquire+0x197/0x470 [ 1206.564299] ? fs_reclaim_acquire+0xa5/0x100 [ 1206.564714] ? create_object.isra.0+0x3a/0xa20 [ 1206.565134] ? kmem_cache_alloc+0x301/0x310 [ 1206.565531] ? create_object.isra.0+0x3a/0xa20 [ 1206.565946] kmem_cache_alloc+0x301/0x310 [ 1206.566340] create_object.isra.0+0x3a/0xa20 [ 1206.566752] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1206.567226] kmem_cache_alloc_trace+0x151/0x320 [ 1206.567668] ? bprm_execve+0x9a0/0x1960 [ 1206.568035] __request_module+0x2e0/0x920 [ 1206.568421] ? free_modprobe_argv+0x90/0x90 [ 1206.568818] ? __lockdep_reset_lock+0x180/0x180 [ 1206.569258] ? find_held_lock+0x2c/0x110 [ 1206.569639] ? bprm_execve+0x8f8/0x1960 [ 1206.570009] ? lock_downgrade+0x6d0/0x6d0 [ 1206.570397] ? elf_core_dump+0x3c50/0x3c50 [ 1206.570799] ? do_raw_read_unlock+0x3b/0x70 [ 1206.571198] ? _raw_read_unlock+0x1a/0x30 [ 1206.571580] ? load_misc_binary+0x605/0xb70 [ 1206.571991] bprm_execve+0x9a0/0x1960 [ 1206.572432] ? open_exec+0x70/0x70 [ 1206.572763] ? copy_string_kernel+0x3b6/0x450 [ 1206.573189] do_execveat_common+0x772/0x8d0 [ 1206.573596] ? bprm_execve+0x1960/0x1960 [ 1206.573995] __x64_sys_execveat+0xed/0x140 [ 1206.574391] do_syscall_64+0x33/0x40 [ 1206.574742] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.575218] RIP: 0033:0x7f3739cfbb19 [ 1206.575561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.577218] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1206.577924] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1206.578581] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1206.579231] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1206.579789] FAULT_INJECTION: forcing a failure. [ 1206.579789] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.579886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1206.579905] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1206.582839] CPU: 1 PID: 15625 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1206.582974] hpet: Lost 1 RTC interrupts [ 1206.583902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.585460] Call Trace: [ 1206.585860] dump_stack+0x107/0x167 [ 1206.586405] should_fail.cold+0x5/0xa [ 1206.586998] ? bprm_execve+0x9a0/0x1960 [ 1206.587585] should_failslab+0x5/0x20 01:25:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) 01:25:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 01:25:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 01:25:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 01:25:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x38) 01:25:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) [ 1206.588146] __kmalloc_track_caller+0x79/0x370 [ 1206.589032] ? __request_module+0x2fe/0x920 [ 1206.589682] ? bprm_execve+0x9a0/0x1960 [ 1206.590266] kstrdup+0x36/0x70 [ 1206.590756] __request_module+0x2fe/0x920 [ 1206.591373] ? free_modprobe_argv+0x90/0x90 [ 1206.592011] ? __lockdep_reset_lock+0x180/0x180 [ 1206.592711] ? find_held_lock+0x2c/0x110 [ 1206.593377] ? bprm_execve+0x8f8/0x1960 [ 1206.593449] FAULT_INJECTION: forcing a failure. [ 1206.593449] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.593959] ? lock_downgrade+0x6d0/0x6d0 [ 1206.593987] ? elf_core_dump+0x3c50/0x3c50 [ 1206.596173] ? do_raw_read_unlock+0x3b/0x70 [ 1206.596802] ? _raw_read_unlock+0x1a/0x30 [ 1206.597405] ? load_misc_binary+0x605/0xb70 [ 1206.598059] bprm_execve+0x9a0/0x1960 [ 1206.598646] ? open_exec+0x70/0x70 [ 1206.599173] ? copy_string_kernel+0x3b6/0x450 [ 1206.599845] do_execveat_common+0x772/0x8d0 [ 1206.600485] ? bprm_execve+0x1960/0x1960 [ 1206.601114] __x64_sys_execveat+0xed/0x140 [ 1206.601746] do_syscall_64+0x33/0x40 [ 1206.602295] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.603046] RIP: 0033:0x7fa50365eb19 [ 1206.603594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.606215] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1206.607331] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1206.608423] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1206.609451] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1206.610490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1206.611521] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1206.612597] CPU: 0 PID: 15633 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1206.613226] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.613963] Call Trace: [ 1206.614203] dump_stack+0x107/0x167 [ 1206.614542] should_fail.cold+0x5/0xa [ 1206.614881] ? mm_alloc+0x19/0xd0 [ 1206.615203] should_failslab+0x5/0x20 [ 1206.615542] kmem_cache_alloc+0x5b/0x310 [ 1206.615907] ? kasan_unpoison_shadow+0x33/0x50 [ 1206.616315] mm_alloc+0x19/0xd0 [ 1206.616612] alloc_bprm+0x1cb/0x8f0 [ 1206.616939] ? __virt_addr_valid+0x170/0x5d0 [ 1206.617335] do_execveat_common+0x275/0x8d0 [ 1206.617724] ? strncpy_from_user+0x9e/0x470 [ 1206.618108] ? bprm_execve+0x1960/0x1960 [ 1206.618489] __x64_sys_execveat+0xed/0x140 [ 1206.618872] do_syscall_64+0x33/0x40 [ 1206.619208] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.619663] RIP: 0033:0x7f1b403e0b19 [ 1206.619997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.621618] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1206.622295] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1206.622934] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1206.623566] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1206.624220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1206.624854] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1206.633225] FAULT_INJECTION: forcing a failure. [ 1206.633225] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.635083] CPU: 1 PID: 15636 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1206.636169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.637420] Call Trace: [ 1206.637827] dump_stack+0x107/0x167 [ 1206.638388] should_fail.cold+0x5/0xa [ 1206.638987] ? __anon_vma_prepare+0x270/0x500 [ 1206.639749] should_failslab+0x5/0x20 [ 1206.640334] kmem_cache_alloc+0x5b/0x310 [ 1206.640970] __anon_vma_prepare+0x270/0x500 [ 1206.641625] ? __pte_alloc+0x194/0x330 [ 1206.642230] handle_mm_fault+0x2b2d/0x3500 [ 1206.642895] ? perf_trace_lock+0x2bd/0x490 [ 1206.643545] ? __lockdep_reset_lock+0x180/0x180 [ 1206.644256] ? __pmd_alloc+0x5e0/0x5e0 [ 1206.644905] __get_user_pages+0x6ec/0x1620 [ 1206.645579] ? follow_page_mask+0x1900/0x1900 [ 1206.646268] ? __lockdep_reset_lock+0x180/0x180 [ 1206.646992] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1206.647737] __get_user_pages_remote+0x1d5/0x870 [ 1206.648462] ? lock_downgrade+0x6d0/0x6d0 [ 1206.649112] get_user_pages_remote+0x63/0x90 [ 1206.649797] get_arg_page+0xba/0x200 [ 1206.650371] ? acct_arg_size+0xe0/0xe0 [ 1206.650970] ? downgrade_write+0x3a0/0x3a0 [ 1206.651627] ? count.constprop.0+0x1b3/0x290 [ 1206.652352] copy_string_kernel+0x1b4/0x450 [ 1206.653050] do_execveat_common+0x525/0x8d0 [ 1206.653731] ? bprm_execve+0x1960/0x1960 [ 1206.654390] __x64_sys_execveat+0xed/0x140 [ 1206.655063] do_syscall_64+0x33/0x40 [ 1206.655715] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.656490] RIP: 0033:0x7f1d9af7cb19 [ 1206.657059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.659819] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1206.660967] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1206.662044] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1206.663091] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1206.664167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1206.665242] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:25:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 01:25:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 01:25:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 01:25:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) 01:25:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) [ 1206.757765] FAULT_INJECTION: forcing a failure. [ 1206.757765] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.758870] CPU: 0 PID: 15827 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1206.759458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.760168] Call Trace: [ 1206.760409] dump_stack+0x107/0x167 [ 1206.760728] should_fail.cold+0x5/0xa [ 1206.761058] ? create_object.isra.0+0x3a/0xa20 [ 1206.761453] should_failslab+0x5/0x20 [ 1206.761789] kmem_cache_alloc+0x5b/0x310 [ 1206.762153] create_object.isra.0+0x3a/0xa20 [ 1206.762540] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1206.762986] __kmalloc_track_caller+0x177/0x370 [ 1206.763388] ? __request_module+0x2fe/0x920 [ 1206.763783] ? bprm_execve+0x9a0/0x1960 [ 1206.764128] kstrdup+0x36/0x70 [ 1206.764413] __request_module+0x2fe/0x920 [ 1206.764814] ? free_modprobe_argv+0x90/0x90 [ 1206.765185] ? __lockdep_reset_lock+0x180/0x180 [ 1206.765595] ? find_held_lock+0x2c/0x110 [ 1206.765952] ? bprm_execve+0x8f8/0x1960 [ 1206.766295] ? lock_downgrade+0x6d0/0x6d0 [ 1206.766666] ? elf_core_dump+0x3c50/0x3c50 [ 1206.767031] ? do_raw_read_unlock+0x3b/0x70 [ 1206.767401] ? _raw_read_unlock+0x1a/0x30 [ 1206.767764] ? load_misc_binary+0x605/0xb70 [ 1206.768147] bprm_execve+0x9a0/0x1960 [ 1206.768487] ? open_exec+0x70/0x70 [ 1206.768794] ? copy_string_kernel+0x3b6/0x450 [ 1206.769190] do_execveat_common+0x772/0x8d0 [ 1206.769565] ? bprm_execve+0x1960/0x1960 [ 1206.769933] __x64_sys_execveat+0xed/0x140 [ 1206.770303] do_syscall_64+0x33/0x40 [ 1206.770629] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.771077] RIP: 0033:0x7f3739cfbb19 [ 1206.771397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.772962] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1206.773609] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1206.774224] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1206.774844] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1206.775445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1206.776054] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1206.790683] FAULT_INJECTION: forcing a failure. [ 1206.790683] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.792576] CPU: 1 PID: 15843 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1206.793633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.794902] Call Trace: [ 1206.795317] dump_stack+0x107/0x167 [ 1206.795946] should_fail.cold+0x5/0xa [ 1206.796533] ? create_object.isra.0+0x3a/0xa20 [ 1206.797232] should_failslab+0x5/0x20 [ 1206.797811] kmem_cache_alloc+0x5b/0x310 [ 1206.798081] FAULT_INJECTION: forcing a failure. [ 1206.798081] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.798447] create_object.isra.0+0x3a/0xa20 [ 1206.800000] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1206.800777] __kmalloc_track_caller+0x177/0x370 [ 1206.801486] ? __request_module+0x2fe/0x920 [ 1206.802159] ? bprm_execve+0x9a0/0x1960 [ 1206.802778] kstrdup+0x36/0x70 [ 1206.803276] __request_module+0x2fe/0x920 [ 1206.803912] ? free_modprobe_argv+0x90/0x90 [ 1206.804571] ? __lockdep_reset_lock+0x180/0x180 [ 1206.805305] ? find_held_lock+0x2c/0x110 [ 1206.805934] ? bprm_execve+0x8f8/0x1960 [ 1206.806549] ? lock_downgrade+0x6d0/0x6d0 [ 1206.807183] ? elf_core_dump+0x3c50/0x3c50 [ 1206.807829] ? do_raw_read_unlock+0x3b/0x70 [ 1206.808480] ? _raw_read_unlock+0x1a/0x30 [ 1206.809112] ? load_misc_binary+0x605/0xb70 [ 1206.809790] bprm_execve+0x9a0/0x1960 [ 1206.810390] ? open_exec+0x70/0x70 [ 1206.810952] ? copy_string_kernel+0x3b6/0x450 [ 1206.811733] do_execveat_common+0x772/0x8d0 [ 1206.812402] ? bprm_execve+0x1960/0x1960 [ 1206.813058] __x64_sys_execveat+0xed/0x140 [ 1206.813717] do_syscall_64+0x33/0x40 [ 1206.814284] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.815069] RIP: 0033:0x7fa50365eb19 [ 1206.815643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.818382] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1206.819543] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1206.820620] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1206.821698] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1206.822787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1206.823864] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1206.824987] CPU: 0 PID: 15950 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1206.825589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.826291] Call Trace: [ 1206.826530] dump_stack+0x107/0x167 [ 1206.826830] should_fail.cold+0x5/0xa [ 1206.827184] ? create_object.isra.0+0x3a/0xa20 [ 1206.827565] should_failslab+0x5/0x20 [ 1206.827894] kmem_cache_alloc+0x5b/0x310 [ 1206.828243] create_object.isra.0+0x3a/0xa20 [ 1206.828601] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1206.829020] kmem_cache_alloc+0x159/0x310 [ 1206.829375] mm_alloc+0x19/0xd0 [ 1206.829646] alloc_bprm+0x1cb/0x8f0 [ 1206.829956] ? __virt_addr_valid+0x170/0x5d0 [ 1206.830330] do_execveat_common+0x275/0x8d0 [ 1206.830706] ? strncpy_from_user+0x9e/0x470 [ 1206.831070] ? bprm_execve+0x1960/0x1960 [ 1206.831422] __x64_sys_execveat+0xed/0x140 [ 1206.831784] do_syscall_64+0x33/0x40 [ 1206.832099] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.832532] RIP: 0033:0x7f1b403e0b19 [ 1206.832852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.834398] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1206.835055] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1206.835651] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c 01:25:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) [ 1206.836250] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1206.836965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1206.837574] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:25:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 01:25:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) [ 1206.884215] FAULT_INJECTION: forcing a failure. [ 1206.884215] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.885916] CPU: 1 PID: 16012 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1206.886983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.888240] Call Trace: [ 1206.888654] dump_stack+0x107/0x167 [ 1206.889226] should_fail.cold+0x5/0xa [ 1206.889898] ? create_object.isra.0+0x3a/0xa20 [ 1206.890616] should_failslab+0x5/0x20 [ 1206.891200] kmem_cache_alloc+0x5b/0x310 [ 1206.891838] create_object.isra.0+0x3a/0xa20 [ 1206.892515] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1206.893304] kmem_cache_alloc+0x159/0x310 [ 1206.893955] __anon_vma_prepare+0x270/0x500 [ 1206.894628] ? __pte_alloc+0x194/0x330 [ 1206.895236] handle_mm_fault+0x2b2d/0x3500 [ 1206.895891] ? perf_trace_lock+0x2bd/0x490 [ 1206.896541] ? __lockdep_reset_lock+0x180/0x180 [ 1206.897256] ? __pmd_alloc+0x5e0/0x5e0 [ 1206.897901] __get_user_pages+0x6ec/0x1620 [ 1206.898586] ? follow_page_mask+0x1900/0x1900 [ 1206.899274] ? __lockdep_reset_lock+0x180/0x180 [ 1206.899981] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1206.900722] __get_user_pages_remote+0x1d5/0x870 [ 1206.901449] ? lock_downgrade+0x6d0/0x6d0 [ 1206.902099] get_user_pages_remote+0x63/0x90 [ 1206.902792] get_arg_page+0xba/0x200 [ 1206.903368] ? acct_arg_size+0xe0/0xe0 [ 1206.903960] ? downgrade_write+0x3a0/0x3a0 [ 1206.904611] ? count.constprop.0+0x1b3/0x290 [ 1206.905373] copy_string_kernel+0x1b4/0x450 [ 1206.906054] do_execveat_common+0x525/0x8d0 [ 1206.906730] ? bprm_execve+0x1960/0x1960 [ 1206.907386] __x64_sys_execveat+0xed/0x140 [ 1206.908043] do_syscall_64+0x33/0x40 [ 1206.908615] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.909392] RIP: 0033:0x7f1d9af7cb19 [ 1206.909961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.912727] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1206.913883] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1206.914969] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1206.916044] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1206.917121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1206.918198] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:25:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 01:25:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 01:25:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 01:25:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) [ 1207.009857] FAULT_INJECTION: forcing a failure. [ 1207.009857] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.011556] CPU: 0 PID: 16284 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1207.012160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1207.012869] Call Trace: [ 1207.013108] dump_stack+0x107/0x167 [ 1207.013431] should_fail.cold+0x5/0xa [ 1207.013772] ? call_usermodehelper_setup+0xa2/0x2f0 [ 1207.014218] should_failslab+0x5/0x20 [ 1207.014589] kmem_cache_alloc_trace+0x55/0x320 [ 1207.014998] call_usermodehelper_setup+0xa2/0x2f0 [ 1207.015421] ? copy_regset_to_user+0x170/0x170 [ 1207.015822] ? bprm_execve+0x9a0/0x1960 [ 1207.016170] __request_module+0x3f9/0x920 [ 1207.016516] ? free_modprobe_argv+0x90/0x90 [ 1207.016894] ? __lockdep_reset_lock+0x180/0x180 [ 1207.017312] ? find_held_lock+0x2c/0x110 [ 1207.017670] ? bprm_execve+0x8f8/0x1960 [ 1207.018001] ? lock_downgrade+0x6d0/0x6d0 [ 1207.018359] ? elf_core_dump+0x3c50/0x3c50 [ 1207.018731] ? do_raw_read_unlock+0x3b/0x70 [ 1207.019083] ? _raw_read_unlock+0x1a/0x30 [ 1207.019434] ? load_misc_binary+0x605/0xb70 [ 1207.019814] bprm_execve+0x9a0/0x1960 [ 1207.020154] ? open_exec+0x70/0x70 [ 1207.020462] ? copy_string_kernel+0x3b6/0x450 [ 1207.020843] do_execveat_common+0x772/0x8d0 [ 1207.021219] ? bprm_execve+0x1960/0x1960 [ 1207.021591] __x64_sys_execveat+0xed/0x140 [ 1207.021966] do_syscall_64+0x33/0x40 [ 1207.022294] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1207.022740] RIP: 0033:0x7f3739cfbb19 [ 1207.023060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1207.024608] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1207.025257] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1207.025862] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1207.026478] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1207.027069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1207.027672] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1207.036055] FAULT_INJECTION: forcing a failure. [ 1207.036055] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.037827] CPU: 1 PID: 16375 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1207.038892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1207.040141] Call Trace: [ 1207.040550] dump_stack+0x107/0x167 [ 1207.041104] should_fail.cold+0x5/0xa [ 1207.041686] ? getname_flags.part.0+0x50/0x4f0 [ 1207.042382] should_failslab+0x5/0x20 [ 1207.042968] kmem_cache_alloc+0x5b/0x310 [ 1207.043589] getname_flags.part.0+0x50/0x4f0 [ 1207.044260] getname_flags+0x9a/0xe0 [ 1207.044831] __x64_sys_execveat+0xd6/0x140 [ 1207.045477] do_syscall_64+0x33/0x40 [ 1207.046136] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1207.046921] RIP: 0033:0x7fa24edbfb19 [ 1207.047487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1207.050246] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1207.051425] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1207.052500] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1207.053577] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1207.054657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1207.055730] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:25:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) 01:25:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 01:25:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 01:25:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) 01:25:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) 01:25:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 01:25:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 01:25:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) [ 1219.931903] FAULT_INJECTION: forcing a failure. [ 1219.931903] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.933636] CPU: 1 PID: 16489 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1219.934653] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.935851] Call Trace: [ 1219.936250] dump_stack+0x107/0x167 [ 1219.936797] should_fail.cold+0x5/0xa [ 1219.937372] ? call_usermodehelper_setup+0xa2/0x2f0 [ 1219.938106] should_failslab+0x5/0x20 [ 1219.938678] kmem_cache_alloc_trace+0x55/0x320 [ 1219.939366] call_usermodehelper_setup+0xa2/0x2f0 [ 1219.940074] ? copy_regset_to_user+0x170/0x170 [ 1219.940753] ? bprm_execve+0x9a0/0x1960 [ 1219.941337] __request_module+0x3f9/0x920 [ 1219.941958] ? free_modprobe_argv+0x90/0x90 [ 1219.942609] ? __lockdep_reset_lock+0x180/0x180 [ 1219.943315] ? find_held_lock+0x2c/0x110 [ 1219.943933] ? bprm_execve+0x8f8/0x1960 [ 1219.944522] ? lock_downgrade+0x6d0/0x6d0 [ 1219.945131] ? elf_core_dump+0x3c50/0x3c50 [ 1219.945758] ? do_raw_read_unlock+0x3b/0x70 [ 1219.946449] ? _raw_read_unlock+0x1a/0x30 [ 1219.947064] ? load_misc_binary+0x605/0xb70 [ 1219.947716] bprm_execve+0x9a0/0x1960 [ 1219.948301] ? open_exec+0x70/0x70 [ 1219.948827] ? copy_string_kernel+0x3b6/0x450 [ 1219.949505] do_execveat_common+0x772/0x8d0 [ 1219.950147] ? bprm_execve+0x1960/0x1960 [ 1219.950788] __x64_sys_execveat+0xed/0x140 [ 1219.951419] do_syscall_64+0x33/0x40 [ 1219.951967] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.952712] RIP: 0033:0x7fa50365eb19 [ 1219.953260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.955903] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1219.957018] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1219.958045] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1219.959078] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.960101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1219.961129] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1219.963154] FAULT_INJECTION: forcing a failure. [ 1219.963154] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1219.964973] CPU: 0 PID: 16496 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1219.965971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.967167] Call Trace: [ 1219.967563] dump_stack+0x107/0x167 [ 1219.968102] should_fail.cold+0x5/0xa [ 1219.968666] __alloc_pages_nodemask+0x182/0x600 [ 1219.969347] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1219.970247] alloc_pages_current+0x187/0x280 [ 1219.970903] __get_free_pages+0xc/0xa0 [ 1219.971474] pgd_alloc+0x84/0x4e0 [ 1219.971987] ? pgd_page_get_mm+0x40/0x40 [ 1219.972587] ? lockdep_init_map_type+0x2c7/0x780 [ 1219.973289] ? lockdep_init_map_type+0x2c7/0x780 [ 1219.973987] mm_init+0x670/0xab0 [ 1219.974484] mm_alloc+0xa2/0xd0 [ 1219.974987] alloc_bprm+0x1cb/0x8f0 [ 1219.975519] ? __virt_addr_valid+0x170/0x5d0 [ 1219.976166] do_execveat_common+0x275/0x8d0 [ 1219.976803] ? strncpy_from_user+0x9e/0x470 [ 1219.977298] FAULT_INJECTION: forcing a failure. [ 1219.977298] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.977437] ? bprm_execve+0x1960/0x1960 [ 1219.979630] __x64_sys_execveat+0xed/0x140 [ 1219.980253] do_syscall_64+0x33/0x40 [ 1219.980799] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.981542] RIP: 0033:0x7f1b403e0b19 [ 1219.982087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.984732] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1219.985842] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1219.986885] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1219.987916] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.988950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1219.989981] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1219.991046] CPU: 1 PID: 16502 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1219.992117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.993378] Call Trace: [ 1219.993764] dump_stack+0x107/0x167 [ 1219.994292] should_fail.cold+0x5/0xa [ 1219.994854] ? create_object.isra.0+0x3a/0xa20 [ 1219.995513] should_failslab+0x5/0x20 [ 1219.996072] kmem_cache_alloc+0x5b/0x310 [ 1219.996668] create_object.isra.0+0x3a/0xa20 [ 1219.997305] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1219.998041] kmem_cache_alloc+0x159/0x310 [ 1219.998657] getname_flags.part.0+0x50/0x4f0 [ 1219.999296] getname_flags+0x9a/0xe0 [ 1219.999846] __x64_sys_execveat+0xd6/0x140 [ 1220.000461] do_syscall_64+0x33/0x40 [ 1220.001002] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1220.001739] RIP: 0033:0x7fa24edbfb19 [ 1220.002279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.004903] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1220.005994] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1220.007024] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1220.008044] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1220.009157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1220.010182] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1220.018062] FAULT_INJECTION: forcing a failure. [ 1220.018062] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.019806] CPU: 0 PID: 16486 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1220.020829] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1220.022044] Call Trace: [ 1220.022444] dump_stack+0x107/0x167 [ 1220.023007] should_fail.cold+0x5/0xa [ 1220.023588] ? create_object.isra.0+0x3a/0xa20 [ 1220.024276] should_failslab+0x5/0x20 [ 1220.024880] kmem_cache_alloc+0x5b/0x310 [ 1220.025498] create_object.isra.0+0x3a/0xa20 [ 1220.026150] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1220.026918] kmem_cache_alloc_trace+0x151/0x320 [ 1220.027642] call_usermodehelper_setup+0xa2/0x2f0 [ 1220.028363] ? copy_regset_to_user+0x170/0x170 [ 1220.029044] ? bprm_execve+0x9a0/0x1960 [ 1220.029627] __request_module+0x3f9/0x920 [ 1220.030249] ? free_modprobe_argv+0x90/0x90 [ 1220.030912] ? __lockdep_reset_lock+0x180/0x180 [ 1220.031616] ? find_held_lock+0x2c/0x110 [ 1220.032229] ? bprm_execve+0x8f8/0x1960 [ 1220.032820] ? lock_downgrade+0x6d0/0x6d0 [ 1220.033431] ? elf_core_dump+0x3c50/0x3c50 [ 1220.034075] ? do_raw_read_unlock+0x3b/0x70 [ 1220.034717] ? _raw_read_unlock+0x1a/0x30 [ 1220.035327] ? load_misc_binary+0x605/0xb70 [ 1220.035984] bprm_execve+0x9a0/0x1960 [ 1220.036570] ? open_exec+0x70/0x70 [ 1220.037099] ? copy_string_kernel+0x3b6/0x450 [ 1220.037778] do_execveat_common+0x772/0x8d0 [ 1220.038424] ? bprm_execve+0x1960/0x1960 [ 1220.039078] __x64_sys_execveat+0xed/0x140 [ 1220.039714] do_syscall_64+0x33/0x40 [ 1220.040277] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1220.041024] RIP: 0033:0x7f3739cfbb19 [ 1220.041587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.044249] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1220.045358] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1220.046399] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1220.047439] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1220.048478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1220.049514] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1220.050711] hpet: Lost 1 RTC interrupts [ 1220.055066] FAULT_INJECTION: forcing a failure. [ 1220.055066] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1220.056922] CPU: 1 PID: 16490 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1220.057952] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1220.059179] Call Trace: [ 1220.059598] dump_stack+0x107/0x167 [ 1220.060176] should_fail.cold+0x5/0xa [ 1220.060763] __alloc_pages_nodemask+0x182/0x600 [ 1220.061457] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1220.062336] ? up_write+0x191/0x550 [ 1220.062894] ? rwlock_bug.part.0+0x90/0x90 [ 1220.063523] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1220.064331] alloc_pages_vma+0xbb/0x410 [ 1220.064930] handle_mm_fault+0x152f/0x3500 [ 1220.065564] ? perf_trace_lock+0x2bd/0x490 [ 1220.066193] ? __lockdep_reset_lock+0x180/0x180 [ 1220.066886] ? __pmd_alloc+0x5e0/0x5e0 [ 1220.067506] __get_user_pages+0x6ec/0x1620 [ 1220.068154] ? follow_page_mask+0x1900/0x1900 [ 1220.068816] ? __lockdep_reset_lock+0x180/0x180 [ 1220.069498] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1220.070218] __get_user_pages_remote+0x1d5/0x870 [ 1220.071040] ? lock_downgrade+0x6d0/0x6d0 [ 1220.071742] get_user_pages_remote+0x63/0x90 [ 1220.072401] get_arg_page+0xba/0x200 [ 1220.072952] ? acct_arg_size+0xe0/0xe0 [ 1220.073524] ? downgrade_write+0x3a0/0x3a0 [ 1220.074152] ? count.constprop.0+0x1b3/0x290 [ 1220.074824] copy_string_kernel+0x1b4/0x450 [ 1220.075480] do_execveat_common+0x525/0x8d0 [ 1220.076121] ? bprm_execve+0x1960/0x1960 [ 1220.076753] __x64_sys_execveat+0xed/0x140 [ 1220.077386] do_syscall_64+0x33/0x40 [ 1220.077938] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1220.078691] RIP: 0033:0x7f1d9af7cb19 [ 1220.079238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.081881] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1220.082995] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1220.084032] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1220.085071] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1220.086105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1220.087219] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:25:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) 01:25:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 01:25:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 01:25:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) [ 1220.206254] FAULT_INJECTION: forcing a failure. [ 1220.206254] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.207978] CPU: 1 PID: 16792 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1220.209003] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1220.210193] Call Trace: [ 1220.210601] dump_stack+0x107/0x167 [ 1220.211138] should_fail.cold+0x5/0xa [ 1220.211695] ? vm_area_alloc+0x1c/0x110 [ 1220.212336] should_failslab+0x5/0x20 [ 1220.212895] kmem_cache_alloc+0x5b/0x310 [ 1220.213492] vm_area_alloc+0x1c/0x110 [ 1220.214047] alloc_bprm+0x337/0x8f0 [ 1220.214588] ? __virt_addr_valid+0x170/0x5d0 [ 1220.215241] do_execveat_common+0x275/0x8d0 [ 1220.215877] ? strncpy_from_user+0x9e/0x470 [ 1220.216511] ? bprm_execve+0x1960/0x1960 [ 1220.217122] __x64_sys_execveat+0xed/0x140 [ 1220.217744] do_syscall_64+0x33/0x40 [ 1220.218289] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1220.219043] RIP: 0033:0x7f1b403e0b19 [ 1220.219591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.222233] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1220.223339] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1220.224372] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1220.225403] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1220.226433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1220.227470] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1220.278036] FAULT_INJECTION: forcing a failure. [ 1220.278036] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.279931] CPU: 0 PID: 16837 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1220.280965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1220.282186] Call Trace: [ 1220.282605] dump_stack+0x107/0x167 [ 1220.283161] should_fail.cold+0x5/0xa [ 1220.283743] ? create_object.isra.0+0x3a/0xa20 [ 1220.284426] should_failslab+0x5/0x20 [ 1220.284997] kmem_cache_alloc+0x5b/0x310 [ 1220.285614] create_object.isra.0+0x3a/0xa20 [ 1220.286271] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1220.287049] kmem_cache_alloc_trace+0x151/0x320 [ 1220.287766] call_usermodehelper_setup+0xa2/0x2f0 [ 1220.288491] ? copy_regset_to_user+0x170/0x170 [ 1220.289189] ? bprm_execve+0x9a0/0x1960 [ 1220.289786] __request_module+0x3f9/0x920 [ 1220.290455] ? free_modprobe_argv+0x90/0x90 [ 1220.291112] ? __lockdep_reset_lock+0x180/0x180 [ 1220.291808] ? find_held_lock+0x2c/0x110 [ 1220.292429] ? bprm_execve+0x8f8/0x1960 [ 1220.293027] ? lock_downgrade+0x6d0/0x6d0 [ 1220.293641] ? elf_core_dump+0x3c50/0x3c50 [ 1220.294276] ? do_raw_read_unlock+0x3b/0x70 [ 1220.294923] ? _raw_read_unlock+0x1a/0x30 [ 1220.295540] ? load_misc_binary+0x605/0xb70 [ 1220.296204] bprm_execve+0x9a0/0x1960 [ 1220.296794] ? open_exec+0x70/0x70 [ 1220.297329] ? copy_string_kernel+0x3b6/0x450 [ 1220.298019] do_execveat_common+0x772/0x8d0 [ 1220.298676] ? bprm_execve+0x1960/0x1960 [ 1220.299316] __x64_sys_execveat+0xed/0x140 [ 1220.299953] do_syscall_64+0x33/0x40 [ 1220.300509] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1220.301266] RIP: 0033:0x7fa50365eb19 [ 1220.301822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.304495] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1220.305617] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1220.306669] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1220.307716] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1220.308773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1220.309820] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1220.311014] hpet: Lost 1 RTC interrupts 01:25:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) 01:25:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 01:25:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 01:25:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) 01:25:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 01:25:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) 01:25:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 01:25:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) [ 1233.945290] FAULT_INJECTION: forcing a failure. [ 1233.945290] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.946469] CPU: 1 PID: 17027 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1233.947127] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1233.947955] Call Trace: [ 1233.948220] dump_stack+0x107/0x167 [ 1233.948571] should_fail.cold+0x5/0xa [ 1233.948936] ? load_elf_phdrs+0x103/0x210 [ 1233.949331] should_failslab+0x5/0x20 [ 1233.949692] __kmalloc+0x72/0x390 [ 1233.950033] load_elf_phdrs+0x103/0x210 [ 1233.950411] ? set_brk+0x180/0x180 [ 1233.950801] load_elf_binary+0x1ef/0x4bc0 [ 1233.951218] ? lock_acquire+0x197/0x470 [ 1233.951594] ? find_held_lock+0x2c/0x110 [ 1233.951990] ? bprm_execve+0xa33/0x1960 [ 1233.952372] ? elf_core_dump+0x37e0/0x37e0 [ 1233.952776] ? do_raw_read_unlock+0x3b/0x70 [ 1233.953273] ? _raw_read_unlock+0x1a/0x30 [ 1233.953665] ? load_misc_binary+0x605/0xb70 [ 1233.954088] bprm_execve+0xa54/0x1960 [ 1233.954463] ? open_exec+0x70/0x70 [ 1233.954840] ? copy_string_kernel+0x3b6/0x450 [ 1233.955279] do_execveat_common+0x772/0x8d0 [ 1233.955694] ? bprm_execve+0x1960/0x1960 [ 1233.956102] __x64_sys_execveat+0xed/0x140 [ 1233.956508] do_syscall_64+0x33/0x40 [ 1233.956862] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1233.957339] RIP: 0033:0x7f3739cfbb19 [ 1233.957716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1233.959405] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1233.960116] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1233.960772] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1233.961481] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1233.962138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1233.962857] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1233.986388] FAULT_INJECTION: forcing a failure. [ 1233.986388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1233.988209] CPU: 0 PID: 17041 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1233.989243] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1233.990462] Call Trace: [ 1233.990878] dump_stack+0x107/0x167 [ 1233.991433] should_fail.cold+0x5/0xa [ 1233.992022] strncpy_from_user+0x34/0x470 [ 1233.992661] getname_flags.part.0+0x95/0x4f0 [ 1233.993324] getname_flags+0x9a/0xe0 [ 1233.993897] __x64_sys_execveat+0xd6/0x140 [ 1233.994542] do_syscall_64+0x33/0x40 [ 1233.995111] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1233.995857] RIP: 0033:0x7fa24edbfb19 [ 1233.996412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1233.999110] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.000277] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1234.001327] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.002370] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.003434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1234.004496] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1234.006004] FAULT_INJECTION: forcing a failure. [ 1234.006004] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.007719] CPU: 0 PID: 17028 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1234.008737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.009949] Call Trace: [ 1234.010348] dump_stack+0x107/0x167 [ 1234.010906] should_fail.cold+0x5/0xa [ 1234.011481] ? load_elf_phdrs+0x103/0x210 [ 1234.012106] should_failslab+0x5/0x20 [ 1234.012675] __kmalloc+0x72/0x390 [ 1234.013205] load_elf_phdrs+0x103/0x210 [ 1234.013795] ? set_brk+0x180/0x180 [ 1234.014351] load_elf_binary+0x1ef/0x4bc0 [ 1234.015006] ? lock_acquire+0x197/0x470 [ 1234.015631] ? find_held_lock+0x2c/0x110 [ 1234.016254] ? bprm_execve+0xa33/0x1960 [ 1234.016851] ? elf_core_dump+0x37e0/0x37e0 [ 1234.017481] ? do_raw_read_unlock+0x3b/0x70 [ 1234.018119] ? _raw_read_unlock+0x1a/0x30 [ 1234.018742] ? load_misc_binary+0x605/0xb70 [ 1234.019404] bprm_execve+0xa54/0x1960 [ 1234.019992] ? open_exec+0x70/0x70 [ 1234.020525] ? copy_string_kernel+0x3b6/0x450 [ 1234.021211] do_execveat_common+0x772/0x8d0 [ 1234.021852] ? bprm_execve+0x1960/0x1960 [ 1234.022493] __x64_sys_execveat+0xed/0x140 [ 1234.023142] do_syscall_64+0x33/0x40 [ 1234.023696] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.024447] RIP: 0033:0x7fa50365eb19 [ 1234.025000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.027671] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.028788] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1234.029826] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.030875] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.031921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.032963] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1234.034182] hpet: Lost 1 RTC interrupts 01:25:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) [ 1234.037100] FAULT_INJECTION: forcing a failure. [ 1234.037100] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.038264] CPU: 1 PID: 17038 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1234.038903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.039641] Call Trace: [ 1234.039886] dump_stack+0x107/0x167 [ 1234.040216] should_fail.cold+0x5/0xa [ 1234.040565] ? vm_area_alloc+0x1c/0x110 [ 1234.040925] should_failslab+0x5/0x20 [ 1234.041268] kmem_cache_alloc+0x5b/0x310 [ 1234.041637] vm_area_alloc+0x1c/0x110 [ 1234.041981] alloc_bprm+0x337/0x8f0 [ 1234.042306] ? __virt_addr_valid+0x170/0x5d0 [ 1234.042711] do_execveat_common+0x275/0x8d0 [ 1234.043101] ? strncpy_from_user+0x9e/0x470 [ 1234.043486] ? bprm_execve+0x1960/0x1960 [ 1234.043863] __x64_sys_execveat+0xed/0x140 [ 1234.044245] do_syscall_64+0x33/0x40 [ 1234.044580] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.045036] RIP: 0033:0x7f1b403e0b19 [ 1234.045373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.047088] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.047764] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1234.048391] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.049021] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.049650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.050284] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1234.063965] FAULT_INJECTION: forcing a failure. [ 1234.063965] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.065099] CPU: 1 PID: 17037 Comm: syz-executor.4 Not tainted 5.10.223 #1 01:25:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xaf2) [ 1234.065810] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.066835] Call Trace: [ 1234.067109] dump_stack+0x107/0x167 [ 1234.067474] should_fail.cold+0x5/0xa [ 1234.067822] ? prepare_creds+0x25/0x5e0 [ 1234.068184] should_failslab+0x5/0x20 [ 1234.068527] kmem_cache_alloc+0x5b/0x310 [ 1234.068904] prepare_creds+0x25/0x5e0 [ 1234.069250] prepare_exec_creds+0xd/0x260 [ 1234.069630] bprm_execve+0x118/0x1960 [ 1234.069983] ? count.constprop.0+0x1b3/0x290 [ 1234.070386] ? open_exec+0x70/0x70 [ 1234.070723] ? copy_string_kernel+0x3b6/0x450 [ 1234.071143] do_execveat_common+0x772/0x8d0 [ 1234.071540] ? bprm_execve+0x1960/0x1960 [ 1234.071928] __x64_sys_execveat+0xed/0x140 [ 1234.072314] do_syscall_64+0x33/0x40 [ 1234.072649] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.073104] RIP: 0033:0x7f1d9af7cb19 [ 1234.073438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.075045] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.075718] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1234.076355] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.076978] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.077606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.078333] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:25:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) 01:25:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) 01:25:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) 01:25:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) [ 1234.186408] FAULT_INJECTION: forcing a failure. [ 1234.186408] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.187985] CPU: 1 PID: 17268 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1234.188570] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.189259] Call Trace: [ 1234.189498] dump_stack+0x107/0x167 [ 1234.189813] should_fail.cold+0x5/0xa [ 1234.190142] ? load_elf_phdrs+0x103/0x210 [ 1234.190506] should_failslab+0x5/0x20 [ 1234.190841] __kmalloc+0x72/0x390 [ 1234.191148] load_elf_phdrs+0x103/0x210 [ 1234.191491] ? set_brk+0x180/0x180 [ 1234.191811] load_elf_binary+0x1ef/0x4bc0 [ 1234.192184] ? lock_acquire+0x197/0x470 [ 1234.192523] ? find_held_lock+0x2c/0x110 [ 1234.192879] ? bprm_execve+0xa33/0x1960 [ 1234.193221] ? elf_core_dump+0x37e0/0x37e0 [ 1234.193585] ? do_raw_read_unlock+0x3b/0x70 [ 1234.193951] ? _raw_read_unlock+0x1a/0x30 [ 1234.194301] ? load_misc_binary+0x605/0xb70 [ 1234.194696] bprm_execve+0xa54/0x1960 [ 1234.195037] ? open_exec+0x70/0x70 [ 1234.195344] ? copy_string_kernel+0x3b6/0x450 [ 1234.195743] do_execveat_common+0x772/0x8d0 [ 1234.196118] ? bprm_execve+0x1960/0x1960 [ 1234.196490] __x64_sys_execveat+0xed/0x140 [ 1234.196856] do_syscall_64+0x33/0x40 [ 1234.197173] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.197605] RIP: 0033:0x7f3739cfbb19 [ 1234.197924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.199435] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.200073] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1234.200666] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.201255] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.201846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.202446] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1234.210784] FAULT_INJECTION: forcing a failure. [ 1234.210784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1234.211859] CPU: 1 PID: 17322 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1234.212442] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.213185] Call Trace: [ 1234.213410] dump_stack+0x107/0x167 [ 1234.213719] should_fail.cold+0x5/0xa [ 1234.214041] strncpy_from_user+0x34/0x470 [ 1234.214390] getname_flags.part.0+0x95/0x4f0 [ 1234.214801] getname_flags+0x9a/0xe0 [ 1234.215118] __x64_sys_execveat+0xd6/0x140 [ 1234.215474] do_syscall_64+0x33/0x40 01:25:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) [ 1234.215787] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.216486] RIP: 0033:0x7fa24edbfb19 [ 1234.216800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.218944] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.219800] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1234.220599] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.221397] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.222187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1234.222990] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1234.263654] FAULT_INJECTION: forcing a failure. [ 1234.263654] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1234.264984] CPU: 1 PID: 17452 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1234.265522] FAULT_INJECTION: forcing a failure. [ 1234.265522] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.265634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.265639] Call Trace: [ 1234.265654] dump_stack+0x107/0x167 [ 1234.265667] should_fail.cold+0x5/0xa [ 1234.265683] __alloc_pages_nodemask+0x182/0x600 [ 1234.265695] ? __lockdep_reset_lock+0x180/0x180 [ 1234.265709] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1234.265722] ? add_mm_counter_fast+0x220/0x220 [ 1234.265750] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1234.265770] alloc_pages_current+0x187/0x280 [ 1234.265795] get_zeroed_page+0x14/0xb0 [ 1234.272898] __pud_alloc+0x33/0x270 [ 1234.273298] handle_mm_fault+0x1a73/0x3500 [ 1234.273768] ? register_lock_class+0xbb/0x17b0 [ 1234.274165] ? perf_trace_lock+0xac/0x490 [ 1234.274624] ? __lockdep_reset_lock+0x180/0x180 [ 1234.275010] ? __pmd_alloc+0x5e0/0x5e0 [ 1234.275456] __get_user_pages+0x6ec/0x1620 [ 1234.275928] ? follow_page_mask+0x1900/0x1900 [ 1234.276321] ? __lockdep_reset_lock+0x180/0x180 [ 1234.276835] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1234.277252] __get_user_pages_remote+0x1d5/0x870 [ 1234.277777] ? lock_downgrade+0x6d0/0x6d0 [ 1234.278145] get_user_pages_remote+0x63/0x90 [ 1234.278630] get_arg_page+0xba/0x200 [ 1234.278970] ? acct_arg_size+0xe0/0xe0 [ 1234.279398] ? downgrade_write+0x3a0/0x3a0 [ 1234.279744] ? count.constprop.0+0x1b3/0x290 [ 1234.280233] copy_string_kernel+0x1b4/0x450 [ 1234.280620] do_execveat_common+0x525/0x8d0 [ 1234.281100] ? bprm_execve+0x1960/0x1960 [ 1234.281588] __x64_sys_execveat+0xed/0x140 [ 1234.282053] do_syscall_64+0x33/0x40 [ 1234.282381] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.282964] RIP: 0033:0x7f1b403e0b19 [ 1234.283292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.285283] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.285946] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1234.286732] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.287508] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.288273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.289041] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1234.289832] CPU: 0 PID: 17386 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1234.290932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.292198] Call Trace: [ 1234.292627] dump_stack+0x107/0x167 [ 1234.293204] should_fail.cold+0x5/0xa [ 1234.293810] ? create_object.isra.0+0x3a/0xa20 [ 1234.294522] should_failslab+0x5/0x20 [ 1234.295091] kmem_cache_alloc+0x5b/0x310 [ 1234.295732] create_object.isra.0+0x3a/0xa20 [ 1234.296379] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1234.297213] kmem_cache_alloc+0x159/0x310 [ 1234.297840] prepare_creds+0x25/0x5e0 [ 1234.298432] prepare_exec_creds+0xd/0x260 [ 1234.299051] bprm_execve+0x118/0x1960 [ 1234.299646] ? count.constprop.0+0x1b3/0x290 [ 1234.300299] ? open_exec+0x70/0x70 [ 1234.300855] ? copy_string_kernel+0x3b6/0x450 [ 1234.301533] do_execveat_common+0x772/0x8d0 [ 1234.302211] ? bprm_execve+0x1960/0x1960 [ 1234.302850] __x64_sys_execveat+0xed/0x140 [ 1234.303516] do_syscall_64+0x33/0x40 [ 1234.304066] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.304843] RIP: 0033:0x7f1d9af7cb19 [ 1234.305391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.308194] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.309297] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1234.310319] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.311350] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.312376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.313463] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1234.314731] hpet: Lost 1 RTC interrupts 01:25:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f0) 01:25:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) 01:25:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) 01:25:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) [ 1234.393626] FAULT_INJECTION: forcing a failure. [ 1234.393626] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.394498] CPU: 1 PID: 17414 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1234.395215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.396061] Call Trace: [ 1234.396341] dump_stack+0x107/0x167 [ 1234.396722] should_fail.cold+0x5/0xa [ 1234.397128] ? create_object.isra.0+0x3a/0xa20 [ 1234.397603] should_failslab+0x5/0x20 [ 1234.398002] kmem_cache_alloc+0x5b/0x310 [ 1234.398431] create_object.isra.0+0x3a/0xa20 [ 1234.398893] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1234.399422] __kmalloc+0x16e/0x390 [ 1234.399729] load_elf_phdrs+0x103/0x210 [ 1234.400143] ? set_brk+0x180/0x180 [ 1234.400523] load_elf_binary+0x1ef/0x4bc0 [ 1234.400972] ? lock_acquire+0x197/0x470 [ 1234.401378] ? find_held_lock+0x2c/0x110 [ 1234.401808] ? bprm_execve+0xa33/0x1960 [ 1234.402221] ? elf_core_dump+0x37e0/0x37e0 [ 1234.402660] ? do_raw_read_unlock+0x3b/0x70 [ 1234.403024] ? _raw_read_unlock+0x1a/0x30 [ 1234.403449] ? load_misc_binary+0x605/0xb70 [ 1234.403909] bprm_execve+0xa54/0x1960 [ 1234.404238] ? open_exec+0x70/0x70 [ 1234.404613] ? copy_string_kernel+0x3b6/0x450 [ 1234.405088] do_execveat_common+0x772/0x8d0 [ 1234.405424] ? bprm_execve+0x1960/0x1960 [ 1234.405873] __x64_sys_execveat+0xed/0x140 [ 1234.406402] do_syscall_64+0x33/0x40 [ 1234.406796] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.407320] RIP: 0033:0x7fa50365eb19 [ 1234.407702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.409168] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.409954] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1234.410684] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.411417] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.412133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.412857] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 01:25:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) [ 1234.444363] FAULT_INJECTION: forcing a failure. [ 1234.444363] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.446190] CPU: 0 PID: 17637 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1234.447270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.448535] Call Trace: [ 1234.448953] dump_stack+0x107/0x167 [ 1234.449523] should_fail.cold+0x5/0xa [ 1234.450121] ? create_object.isra.0+0x3a/0xa20 [ 1234.450844] should_failslab+0x5/0x20 [ 1234.451438] kmem_cache_alloc+0x5b/0x310 [ 1234.452078] create_object.isra.0+0x3a/0xa20 [ 1234.452733] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1234.453558] kmem_cache_alloc_trace+0x151/0x320 [ 1234.454257] ? lock_downgrade+0x6d0/0x6d0 [ 1234.454927] alloc_bprm+0x51/0x8f0 [ 1234.455453] ? __virt_addr_valid+0x170/0x5d0 [ 1234.456153] do_execveat_common+0x275/0x8d0 [ 1234.456803] ? strncpy_from_user+0x9e/0x470 [ 1234.457484] ? bprm_execve+0x1960/0x1960 [ 1234.458120] __x64_sys_execveat+0xed/0x140 [ 1234.458796] do_syscall_64+0x33/0x40 [ 1234.459349] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.460138] RIP: 0033:0x7fa24edbfb19 [ 1234.460694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.463499] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.464676] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1234.465769] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.466896] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.467987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1234.469075] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1234.470308] hpet: Lost 1 RTC interrupts [ 1234.515458] FAULT_INJECTION: forcing a failure. [ 1234.515458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1234.517338] CPU: 0 PID: 17631 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1234.518404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.519725] Call Trace: [ 1234.520138] dump_stack+0x107/0x167 [ 1234.520707] should_fail.cold+0x5/0xa [ 1234.521313] __alloc_pages_nodemask+0x182/0x600 [ 1234.522035] ? mark_held_locks+0x9e/0xe0 [ 1234.522665] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1234.523618] ? kmem_cache_free+0xa7/0x2d0 [ 1234.524278] alloc_pages_current+0x187/0x280 [ 1234.524970] __get_free_pages+0xc/0xa0 [ 1234.525572] ? kmem_cache_free+0x249/0x2d0 [ 1234.526221] tlb_remove_table+0x3ca/0xcb0 [ 1234.526886] ___pte_free_tlb+0x86/0xb0 [ 1234.527498] free_pgd_range+0x747/0x1380 [ 1234.528180] free_pgtables+0x230/0x2f0 [ 1234.528796] exit_mmap+0x28e/0x4f0 [ 1234.529336] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1234.530166] mmput+0xca/0x340 [ 1234.530637] free_bprm+0x65/0x2e0 [ 1234.531161] do_execveat_common+0x2e1/0x8d0 [ 1234.531800] ? bprm_execve+0x1960/0x1960 [ 1234.532433] __x64_sys_execveat+0xed/0x140 [ 1234.533068] do_syscall_64+0x33/0x40 [ 1234.533622] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.534364] RIP: 0033:0x7f3739cfbb19 [ 1234.534922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.537548] RSP: 002b:00007f3737271188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1234.538657] RAX: ffffffffffffffda RBX: 00007f3739e0ef60 RCX: 00007f3739cfbb19 [ 1234.539695] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1234.540730] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.541761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.542805] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 [ 1234.543993] hpet: Lost 1 RTC interrupts [ 1250.102271] FAULT_INJECTION: forcing a failure. [ 1250.102271] name failslab, interval 1, probability 0, space 0, times 0 [ 1250.103431] CPU: 0 PID: 17896 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1250.104111] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1250.104917] Call Trace: [ 1250.105188] dump_stack+0x107/0x167 [ 1250.105552] should_fail.cold+0x5/0xa [ 1250.105930] ? mm_alloc+0x19/0xd0 [ 1250.106282] should_failslab+0x5/0x20 [ 1250.106668] kmem_cache_alloc+0x5b/0x310 [ 1250.107078] ? kasan_unpoison_shadow+0x33/0x50 [ 1250.107544] mm_alloc+0x19/0xd0 [ 1250.107874] alloc_bprm+0x1cb/0x8f0 [ 1250.108236] ? __virt_addr_valid+0x170/0x5d0 [ 1250.108684] do_execveat_common+0x275/0x8d0 [ 1250.109119] ? strncpy_from_user+0x9e/0x470 [ 1250.109549] ? bprm_execve+0x1960/0x1960 [ 1250.109976] __x64_sys_execveat+0xed/0x140 [ 1250.110401] do_syscall_64+0x33/0x40 [ 1250.110782] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1250.111291] RIP: 0033:0x7fa24edbfb19 [ 1250.111663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1250.113447] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1250.114191] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1250.114926] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1250.115622] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1250.116312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1250.117008] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1250.133249] FAULT_INJECTION: forcing a failure. [ 1250.133249] name failslab, interval 1, probability 0, space 0, times 0 [ 1250.134367] CPU: 0 PID: 17902 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1250.135043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1250.135847] Call Trace: [ 1250.136095] dump_stack+0x107/0x167 [ 1250.136454] should_fail.cold+0x5/0xa [ 1250.136831] ? security_prepare_creds+0x112/0x190 [ 1250.137302] should_failslab+0x5/0x20 [ 1250.137671] __kmalloc+0x72/0x390 [ 1250.138018] security_prepare_creds+0x112/0x190 [ 1250.138481] prepare_creds+0x452/0x5e0 [ 1250.138874] prepare_exec_creds+0xd/0x260 [ 1250.139251] bprm_execve+0x118/0x1960 [ 1250.139630] ? count.constprop.0+0x1b3/0x290 [ 1250.140063] ? open_exec+0x70/0x70 [ 1250.140412] ? copy_string_kernel+0x3b6/0x450 [ 1250.140862] do_execveat_common+0x772/0x8d0 [ 1250.141287] ? bprm_execve+0x1960/0x1960 [ 1250.141708] __x64_sys_execveat+0xed/0x140 [ 1250.142126] do_syscall_64+0x33/0x40 [ 1250.142486] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1250.142990] RIP: 0033:0x7f1d9af7cb19 [ 1250.143328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1250.145098] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1250.145827] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1250.146562] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1250.147258] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1250.147941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1250.148574] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:25:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 01:25:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) 01:25:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 01:25:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 01:25:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 01:25:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) 01:25:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) 01:25:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) [ 1250.167331] FAULT_INJECTION: forcing a failure. [ 1250.167331] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1250.168539] CPU: 0 PID: 17911 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1250.169208] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1250.169989] Call Trace: [ 1250.170232] dump_stack+0x107/0x167 [ 1250.170553] should_fail.cold+0x5/0xa [ 1250.170900] __alloc_pages_nodemask+0x182/0x600 [ 1250.171311] ? lock_acquire+0x197/0x470 [ 1250.171663] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1250.172187] ? lock_downgrade+0x6d0/0x6d0 [ 1250.172555] ? do_raw_spin_lock+0x121/0x260 [ 1250.172939] alloc_pages_current+0x187/0x280 [ 1250.173328] __pmd_alloc+0x37/0x5e0 [ 1250.173653] handle_mm_fault+0x1ac4/0x3500 [ 1250.174028] ? register_lock_class+0xbb/0x17b0 [ 1250.174430] ? perf_trace_lock+0xac/0x490 [ 1250.174793] ? __lockdep_reset_lock+0x180/0x180 [ 1250.175206] ? __pmd_alloc+0x5e0/0x5e0 [ 1250.175564] __get_user_pages+0x6ec/0x1620 [ 1250.175943] ? follow_page_mask+0x1900/0x1900 [ 1250.176337] ? __lockdep_reset_lock+0x180/0x180 [ 1250.176749] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1250.177190] __get_user_pages_remote+0x1d5/0x870 [ 1250.177608] ? lock_downgrade+0x6d0/0x6d0 [ 1250.177971] get_user_pages_remote+0x63/0x90 [ 1250.178356] get_arg_page+0xba/0x200 [ 1250.178682] ? acct_arg_size+0xe0/0xe0 [ 1250.179024] ? downgrade_write+0x3a0/0x3a0 [ 1250.179393] ? count.constprop.0+0x1b3/0x290 [ 1250.179781] copy_string_kernel+0x1b4/0x450 [ 1250.180162] do_execveat_common+0x525/0x8d0 [ 1250.180538] ? bprm_execve+0x1960/0x1960 [ 1250.180903] __x64_sys_execveat+0xed/0x140 [ 1250.181271] do_syscall_64+0x33/0x40 [ 1250.181597] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1250.182038] RIP: 0033:0x7f1b403e0b19 [ 1250.182364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1250.183946] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1250.184605] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1250.185220] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1250.185836] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1250.186451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1250.187074] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1250.226612] FAULT_INJECTION: forcing a failure. [ 1250.226612] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1250.228913] CPU: 1 PID: 17907 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1250.230068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1250.231453] Call Trace: [ 1250.231917] dump_stack+0x107/0x167 [ 1250.232545] should_fail.cold+0x5/0xa [ 1250.233220] __alloc_pages_nodemask+0x182/0x600 [ 1250.234014] ? mark_held_locks+0x9e/0xe0 [ 1250.234703] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1250.235742] ? kmem_cache_free+0xa7/0x2d0 [ 1250.236463] alloc_pages_current+0x187/0x280 [ 1250.237219] __get_free_pages+0xc/0xa0 [ 1250.237877] ? kmem_cache_free+0x249/0x2d0 [ 1250.238581] tlb_remove_table+0x3ca/0xcb0 [ 1250.239309] ___pte_free_tlb+0x86/0xb0 [ 1250.240053] free_pgd_range+0x747/0x1380 [ 1250.240799] free_pgtables+0x230/0x2f0 [ 1250.241470] exit_mmap+0x28e/0x4f0 [ 1250.242077] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1250.243035] mmput+0xca/0x340 [ 1250.243577] free_bprm+0x65/0x2e0 [ 1250.244170] do_execveat_common+0x2e1/0x8d0 [ 1250.244906] ? bprm_execve+0x1960/0x1960 [ 1250.245630] __x64_sys_execveat+0xed/0x140 [ 1250.246352] do_syscall_64+0x33/0x40 [ 1250.246984] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1250.247839] RIP: 0033:0x7fa50365eb19 [ 1250.248467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1250.251457] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1250.252727] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1250.253900] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1250.255094] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1250.256353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1250.257539] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1250.259600] FAULT_INJECTION: forcing a failure. [ 1250.259600] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1250.262089] CPU: 1 PID: 17899 Comm: syz-executor.1 Not tainted 5.10.223 #1 [ 1250.263330] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1250.264698] Call Trace: [ 1250.265166] dump_stack+0x107/0x167 [ 1250.265793] should_fail.cold+0x5/0xa [ 1250.266460] _copy_to_user+0x2e/0x180 [ 1250.267139] simple_read_from_buffer+0xcc/0x160 [ 1250.267945] proc_fail_nth_read+0x198/0x230 [ 1250.268687] ? proc_sessionid_read+0x230/0x230 [ 1250.269470] ? security_file_permission+0xb1/0xe0 [ 1250.270311] ? proc_sessionid_read+0x230/0x230 [ 1250.271175] vfs_read+0x228/0x620 [ 1250.271795] ksys_read+0x12d/0x260 [ 1250.272402] ? vfs_write+0xb10/0xb10 [ 1250.273053] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1250.273931] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1250.274812] do_syscall_64+0x33/0x40 [ 1250.275465] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1250.276335] RIP: 0033:0x7f3739cae69c [ 1250.276971] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1250.279991] RSP: 002b:00007f3737271170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1250.281274] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f3739cae69c [ 1250.282466] RDX: 000000000000000f RSI: 00007f37372711e0 RDI: 0000000000000004 [ 1250.283659] RBP: 00007f37372711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1250.284846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1250.286034] R13: 00007ffd0d22df9f R14: 00007f3737271300 R15: 0000000000022000 01:26:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) 01:26:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) 01:26:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1264.119130] FAULT_INJECTION: forcing a failure. [ 1264.119130] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.120933] CPU: 1 PID: 18225 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1264.122062] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1264.123318] Call Trace: [ 1264.123723] dump_stack+0x107/0x167 [ 1264.124274] should_fail.cold+0x5/0xa 01:26:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 01:26:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 01:26:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 01:26:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) 01:26:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) [ 1264.124922] ? mm_alloc+0x19/0xd0 [ 1264.125497] should_failslab+0x5/0x20 [ 1264.126089] kmem_cache_alloc+0x5b/0x310 [ 1264.126694] ? kasan_unpoison_shadow+0x33/0x50 [ 1264.127402] mm_alloc+0x19/0xd0 [ 1264.127907] alloc_bprm+0x1cb/0x8f0 [ 1264.128451] ? __virt_addr_valid+0x170/0x5d0 [ 1264.129126] do_execveat_common+0x275/0x8d0 [ 1264.129767] ? strncpy_from_user+0x9e/0x470 [ 1264.130424] ? bprm_execve+0x1960/0x1960 [ 1264.131069] __x64_sys_execveat+0xed/0x140 [ 1264.131723] do_syscall_64+0x33/0x40 [ 1264.132303] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1264.133067] RIP: 0033:0x7fa24edbfb19 [ 1264.133624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1264.136387] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1264.137591] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1264.138677] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1264.139743] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1264.140828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1264.141910] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1264.169616] FAULT_INJECTION: forcing a failure. [ 1264.169616] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.171342] CPU: 1 PID: 18326 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1264.172390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1264.173641] Call Trace: [ 1264.174049] dump_stack+0x107/0x167 [ 1264.174614] should_fail.cold+0x5/0xa [ 1264.175225] ? __pmd_alloc+0x94/0x5e0 [ 1264.175815] should_failslab+0x5/0x20 [ 1264.176404] kmem_cache_alloc+0x5b/0x310 [ 1264.177028] __pmd_alloc+0x94/0x5e0 [ 1264.177582] handle_mm_fault+0x1ac4/0x3500 [ 1264.178245] ? register_lock_class+0xbb/0x17b0 [ 1264.178960] ? __pmd_alloc+0x5e0/0x5e0 [ 1264.179544] ? trace_hardirqs_on+0x5b/0x180 [ 1264.180215] __get_user_pages+0x6ec/0x1620 [ 1264.180868] ? follow_page_mask+0x1900/0x1900 [ 1264.181543] ? __lockdep_reset_lock+0x180/0x180 [ 1264.182239] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1264.182977] __get_user_pages_remote+0x1d5/0x870 [ 1264.183698] ? lock_downgrade+0x6d0/0x6d0 [ 1264.184441] get_user_pages_remote+0x63/0x90 [ 1264.185136] get_arg_page+0xba/0x200 [ 1264.185705] ? acct_arg_size+0xe0/0xe0 [ 1264.186284] ? downgrade_write+0x3a0/0x3a0 [ 1264.186928] ? count.constprop.0+0x1b3/0x290 [ 1264.187624] copy_string_kernel+0x1b4/0x450 [ 1264.188291] do_execveat_common+0x525/0x8d0 [ 1264.188960] ? bprm_execve+0x1960/0x1960 [ 1264.189597] __x64_sys_execveat+0xed/0x140 [ 1264.190229] do_syscall_64+0x33/0x40 [ 1264.190790] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1264.191570] RIP: 0033:0x7f1b403e0b19 [ 1264.192131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1264.194879] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1264.196036] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1264.197140] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1264.198215] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1264.199329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1264.200521] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1264.202719] FAULT_INJECTION: forcing a failure. [ 1264.202719] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1264.204498] CPU: 1 PID: 18223 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1264.205558] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1264.206798] Call Trace: [ 1264.207220] dump_stack+0x107/0x167 [ 1264.207785] should_fail.cold+0x5/0xa [ 1264.208390] __alloc_pages_nodemask+0x182/0x600 [ 1264.209121] ? mark_held_locks+0x9e/0xe0 [ 1264.209753] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1264.210715] ? kmem_cache_free+0xa7/0x2d0 [ 1264.211376] alloc_pages_current+0x187/0x280 [ 1264.212080] __get_free_pages+0xc/0xa0 [ 1264.212670] ? kmem_cache_free+0x249/0x2d0 [ 1264.213307] tlb_remove_table+0x3ca/0xcb0 [ 1264.213992] ___pte_free_tlb+0x86/0xb0 [ 1264.214593] free_pgd_range+0x747/0x1380 [ 1264.215295] free_pgtables+0x230/0x2f0 [ 1264.215956] exit_mmap+0x28e/0x4f0 [ 1264.216504] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1264.217354] mmput+0xca/0x340 [ 1264.217842] free_bprm+0x65/0x2e0 [ 1264.218388] do_execveat_common+0x2e1/0x8d0 [ 1264.219083] ? bprm_execve+0x1960/0x1960 [ 1264.219770] __x64_sys_execveat+0xed/0x140 [ 1264.220414] do_syscall_64+0x33/0x40 [ 1264.220983] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1264.221776] RIP: 0033:0x7fa50365eb19 [ 1264.222336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1264.223422] FAULT_INJECTION: forcing a failure. [ 1264.223422] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.225095] RSP: 002b:00007fa500bd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1264.225120] RAX: ffffffffffffffda RBX: 00007fa503771f60 RCX: 00007fa50365eb19 [ 1264.225139] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1264.229487] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1264.230563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1264.231773] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 [ 1264.232898] CPU: 0 PID: 18443 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1264.233541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1264.234292] Call Trace: [ 1264.234546] dump_stack+0x107/0x167 [ 1264.234889] should_fail.cold+0x5/0xa [ 1264.235254] ? create_object.isra.0+0x3a/0xa20 [ 1264.235680] should_failslab+0x5/0x20 [ 1264.236037] kmem_cache_alloc+0x5b/0x310 [ 1264.236422] create_object.isra.0+0x3a/0xa20 [ 1264.236829] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1264.237307] __kmalloc+0x16e/0x390 [ 1264.237656] security_prepare_creds+0x112/0x190 [ 1264.238094] prepare_creds+0x452/0x5e0 [ 1264.238455] prepare_exec_creds+0xd/0x260 [ 1264.238845] bprm_execve+0x118/0x1960 [ 1264.239207] ? count.constprop.0+0x1b3/0x290 [ 1264.239614] ? open_exec+0x70/0x70 [ 1264.239942] ? copy_string_kernel+0x3b6/0x450 [ 1264.240370] do_execveat_common+0x772/0x8d0 [ 1264.240768] ? bprm_execve+0x1960/0x1960 [ 1264.241162] __x64_sys_execveat+0xed/0x140 [ 1264.241556] do_syscall_64+0x33/0x40 [ 1264.241904] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1264.242370] RIP: 0033:0x7f1d9af7cb19 [ 1264.242714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1264.244368] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1264.245063] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1264.245710] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1264.246351] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1264.247028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1264.247672] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:26:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 01:26:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) 01:26:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) [ 1264.317203] FAULT_INJECTION: forcing a failure. [ 1264.317203] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1264.318391] CPU: 0 PID: 18528 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1264.319017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1264.319749] Call Trace: [ 1264.320001] dump_stack+0x107/0x167 [ 1264.320333] should_fail.cold+0x5/0xa [ 1264.320690] __alloc_pages_nodemask+0x182/0x600 [ 1264.321116] ? perf_trace_lock+0x2bd/0x490 [ 1264.321495] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1264.322063] alloc_pages_current+0x187/0x280 [ 1264.322463] __get_free_pages+0xc/0xa0 [ 1264.322815] pgd_alloc+0x84/0x4e0 [ 1264.323133] ? pgd_page_get_mm+0x40/0x40 [ 1264.323499] ? lockdep_init_map_type+0x2c7/0x780 [ 1264.323926] ? lockdep_init_map_type+0x2c7/0x780 [ 1264.324361] mm_init+0x670/0xab0 [ 1264.324674] mm_alloc+0xa2/0xd0 [ 1264.324975] alloc_bprm+0x1cb/0x8f0 [ 1264.325302] ? __virt_addr_valid+0x170/0x5d0 [ 1264.325706] do_execveat_common+0x275/0x8d0 [ 1264.326099] ? strncpy_from_user+0x9e/0x470 [ 1264.326489] ? bprm_execve+0x1960/0x1960 [ 1264.326874] __x64_sys_execveat+0xed/0x140 [ 1264.327271] do_syscall_64+0x33/0x40 [ 1264.327608] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1264.328060] RIP: 0033:0x7fa24edbfb19 [ 1264.328393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1264.329992] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1264.330674] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1264.331331] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1264.331960] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1264.332594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1264.333230] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:26:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 01:26:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) 01:26:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) 01:26:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 01:26:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) [ 1264.465115] FAULT_INJECTION: forcing a failure. [ 1264.465115] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.467013] CPU: 1 PID: 18851 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1264.468043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1264.469267] Call Trace: [ 1264.469676] dump_stack+0x107/0x167 [ 1264.470234] should_fail.cold+0x5/0xa [ 1264.470828] ? vm_area_alloc+0x1c/0x110 [ 1264.471451] should_failslab+0x5/0x20 [ 1264.472031] kmem_cache_alloc+0x5b/0x310 [ 1264.472649] vm_area_alloc+0x1c/0x110 [ 1264.473226] alloc_bprm+0x337/0x8f0 [ 1264.473806] ? __virt_addr_valid+0x170/0x5d0 [ 1264.474471] do_execveat_common+0x275/0x8d0 [ 1264.475139] ? strncpy_from_user+0x9e/0x470 [ 1264.475806] ? bprm_execve+0x1960/0x1960 [ 1264.476433] __x64_sys_execveat+0xed/0x140 [ 1264.477090] do_syscall_64+0x33/0x40 [ 1264.477674] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1264.478457] RIP: 0033:0x7fa24edbfb19 [ 1264.479038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1264.482031] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1264.483202] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1264.484293] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1264.485375] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1264.486456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1264.487540] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:26:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) [ 1264.518406] FAULT_INJECTION: forcing a failure. [ 1264.518406] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.519439] CPU: 0 PID: 18947 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1264.520002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1264.520664] Call Trace: [ 1264.520895] dump_stack+0x107/0x167 [ 1264.521193] should_fail.cold+0x5/0xa [ 1264.521507] ? create_object.isra.0+0x3a/0xa20 [ 1264.521889] should_failslab+0x5/0x20 [ 1264.522202] kmem_cache_alloc+0x5b/0x310 [ 1264.522538] create_object.isra.0+0x3a/0xa20 [ 1264.522903] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1264.523326] kmem_cache_alloc+0x159/0x310 [ 1264.523667] __pmd_alloc+0x94/0x5e0 [ 1264.523967] handle_mm_fault+0x1ac4/0x3500 [ 1264.524315] ? register_lock_class+0xbb/0x17b0 [ 1264.524690] ? perf_trace_lock+0xac/0x490 [ 1264.525030] ? __lockdep_reset_lock+0x180/0x180 [ 1264.525408] ? __pmd_alloc+0x5e0/0x5e0 [ 1264.525744] __get_user_pages+0x6ec/0x1620 [ 1264.526098] ? follow_page_mask+0x1900/0x1900 [ 1264.526462] ? __lockdep_reset_lock+0x180/0x180 [ 1264.526844] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1264.527235] __get_user_pages_remote+0x1d5/0x870 [ 1264.527622] ? lock_downgrade+0x6d0/0x6d0 [ 1264.527966] get_user_pages_remote+0x63/0x90 [ 1264.528330] get_arg_page+0xba/0x200 [ 1264.528657] ? acct_arg_size+0xe0/0xe0 [ 1264.528974] ? downgrade_write+0x3a0/0x3a0 [ 1264.529321] ? count.constprop.0+0x1b3/0x290 [ 1264.529608] FAULT_INJECTION: forcing a failure. [ 1264.529608] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.529696] copy_string_kernel+0x1b4/0x450 [ 1264.531709] do_execveat_common+0x525/0x8d0 [ 1264.532058] ? bprm_execve+0x1960/0x1960 [ 1264.532395] __x64_sys_execveat+0xed/0x140 [ 1264.532741] do_syscall_64+0x33/0x40 [ 1264.533041] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1264.533453] RIP: 0033:0x7f1b403e0b19 [ 1264.533754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1264.535263] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1264.535877] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1264.536453] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1264.537034] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1264.537605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1264.538178] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1264.538775] CPU: 1 PID: 18953 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1264.539871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1264.541136] Call Trace: [ 1264.541561] dump_stack+0x107/0x167 [ 1264.542136] should_fail.cold+0x5/0xa [ 1264.542721] ? __alloc_file+0x21/0x320 [ 1264.543337] should_failslab+0x5/0x20 01:26:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) 01:26:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) [ 1264.543980] kmem_cache_alloc+0x5b/0x310 [ 1264.544710] __alloc_file+0x21/0x320 [ 1264.545283] alloc_empty_file+0x6d/0x170 [ 1264.545915] path_openat+0xe6/0x2770 [ 1264.546500] ? lock_chain_count+0x20/0x20 [ 1264.547160] ? stack_trace_consume_entry+0x160/0x160 [ 1264.547935] ? path_lookupat+0x860/0x860 [ 1264.548590] ? kasan_save_stack+0x32/0x40 [ 1264.549224] ? kasan_save_stack+0x1b/0x40 [ 1264.549863] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1264.550639] ? security_prepare_creds+0x112/0x190 [ 1264.551364] ? prepare_creds+0x452/0x5e0 [ 1264.551970] ? prepare_exec_creds+0xd/0x260 [ 1264.552636] do_filp_open+0x190/0x3e0 [ 1264.553225] ? may_open_dev+0xf0/0xf0 [ 1264.553820] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1264.554603] ? perf_trace_lock+0x2bd/0x490 [ 1264.555274] ? __lockdep_reset_lock+0x180/0x180 [ 1264.555987] ? find_held_lock+0x2c/0x110 [ 1264.556625] do_open_execat+0x116/0x750 [ 1264.557241] ? bprm_execve+0x49d/0x1960 [ 1264.557861] ? __do_sys_uselib+0x680/0x680 [ 1264.558501] ? do_raw_spin_lock+0x121/0x260 [ 1264.559183] ? rwlock_bug.part.0+0x90/0x90 [ 1264.559941] bprm_execve+0x4dc/0x1960 [ 1264.560532] ? count.constprop.0+0x1b3/0x290 [ 1264.561199] ? open_exec+0x70/0x70 [ 1264.561752] ? copy_string_kernel+0x3b6/0x450 [ 1264.562454] do_execveat_common+0x772/0x8d0 [ 1264.563127] ? bprm_execve+0x1960/0x1960 [ 1264.563781] __x64_sys_execveat+0xed/0x140 [ 1264.564437] do_syscall_64+0x33/0x40 [ 1264.565031] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1264.565806] RIP: 0033:0x7f1d9af7cb19 [ 1264.566368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1264.569105] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1264.570224] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1264.571281] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1264.572338] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1264.573399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1264.574496] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:26:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) [ 1264.589896] FAULT_INJECTION: forcing a failure. [ 1264.589896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1264.591240] CPU: 0 PID: 19002 Comm: syz-executor.7 Not tainted 5.10.223 #1 [ 1264.591817] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1264.592480] Call Trace: [ 1264.592710] dump_stack+0x107/0x167 [ 1264.593014] should_fail.cold+0x5/0xa [ 1264.593340] _copy_from_user+0x2e/0x1b0 [ 1264.593677] kstrtouint_from_user+0xbd/0x220 [ 1264.594041] ? kstrtou8_from_user+0x210/0x210 [ 1264.594424] ? lock_acquire+0x197/0x470 [ 1264.594757] ? ksys_write+0x12d/0x260 [ 1264.595095] proc_fail_nth_write+0x78/0x220 [ 1264.595447] ? proc_task_getattr+0x1f0/0x1f0 [ 1264.595818] ? proc_task_getattr+0x1f0/0x1f0 [ 1264.596176] vfs_write+0x29a/0xb10 [ 1264.596477] ksys_write+0x12d/0x260 [ 1264.596777] ? __ia32_sys_read+0xb0/0xb0 [ 1264.597116] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1264.597543] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1264.597964] do_syscall_64+0x33/0x40 [ 1264.598272] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1264.598686] RIP: 0033:0x7fa5036115ff [ 1264.599001] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1264.600475] RSP: 002b:00007fa500bd4170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1264.601107] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa5036115ff [ 1264.601686] RDX: 0000000000000001 RSI: 00007fa500bd41e0 RDI: 0000000000000004 [ 1264.602260] RBP: 00007fa500bd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1264.602836] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1264.603414] R13: 00007ffef6bb9d7f R14: 00007fa500bd4300 R15: 0000000000022000 01:26:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) 01:26:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) 01:26:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 01:26:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 01:26:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) 01:26:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:26:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 01:26:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 01:26:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) [ 1278.674212] FAULT_INJECTION: forcing a failure. [ 1278.674212] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.675316] CPU: 1 PID: 19402 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1278.675954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1278.676710] Call Trace: [ 1278.676964] dump_stack+0x107/0x167 [ 1278.677309] should_fail.cold+0x5/0xa [ 1278.677665] ? __alloc_file+0x21/0x320 [ 1278.678026] should_failslab+0x5/0x20 [ 1278.678375] kmem_cache_alloc+0x5b/0x310 [ 1278.678759] __alloc_file+0x21/0x320 [ 1278.679109] alloc_empty_file+0x6d/0x170 [ 1278.679486] path_openat+0xe6/0x2770 [ 1278.679840] ? lock_chain_count+0x20/0x20 [ 1278.680226] ? stack_trace_consume_entry+0x160/0x160 [ 1278.680690] ? path_lookupat+0x860/0x860 [ 1278.681076] ? kasan_save_stack+0x32/0x40 [ 1278.681455] ? kasan_save_stack+0x1b/0x40 [ 1278.681833] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1278.682110] FAULT_INJECTION: forcing a failure. [ 1278.682110] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1278.682291] ? security_prepare_creds+0x112/0x190 [ 1278.682315] ? prepare_creds+0x452/0x5e0 [ 1278.685239] ? prepare_exec_creds+0xd/0x260 [ 1278.685640] do_filp_open+0x190/0x3e0 [ 1278.685991] ? may_open_dev+0xf0/0xf0 [ 1278.686346] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1278.686812] ? perf_trace_lock+0x2bd/0x490 [ 1278.687224] ? __lockdep_reset_lock+0x180/0x180 [ 1278.687662] ? find_held_lock+0x2c/0x110 [ 1278.688041] do_open_execat+0x116/0x750 [ 1278.688404] ? bprm_execve+0x49d/0x1960 [ 1278.688773] ? __do_sys_uselib+0x680/0x680 [ 1278.689159] ? do_raw_spin_lock+0x121/0x260 [ 1278.689557] ? rwlock_bug.part.0+0x90/0x90 [ 1278.689960] bprm_execve+0x4dc/0x1960 [ 1278.690315] ? count.constprop.0+0x1b3/0x290 [ 1278.690720] ? open_exec+0x70/0x70 [ 1278.691050] ? copy_string_kernel+0x3b6/0x450 [ 1278.691486] do_execveat_common+0x772/0x8d0 [ 1278.691887] ? bprm_execve+0x1960/0x1960 [ 1278.692283] __x64_sys_execveat+0xed/0x140 [ 1278.692679] do_syscall_64+0x33/0x40 [ 1278.693022] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1278.693486] RIP: 0033:0x7f1d9af7cb19 [ 1278.693830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1278.695468] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1278.696157] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1278.696796] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1278.697438] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1278.698078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1278.698720] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1278.699415] CPU: 0 PID: 19400 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1278.700423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1278.701627] Call Trace: [ 1278.702019] dump_stack+0x107/0x167 [ 1278.702544] should_fail.cold+0x5/0xa [ 1278.703107] __alloc_pages_nodemask+0x182/0x600 [ 1278.703779] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1278.704628] ? find_held_lock+0x2c/0x110 [ 1278.705224] ? __pmd_alloc+0x2db/0x5e0 [ 1278.705783] ? lock_downgrade+0x6d0/0x6d0 [ 1278.706380] ? do_raw_spin_lock+0x121/0x260 [ 1278.707001] alloc_pages_current+0x187/0x280 [ 1278.707657] pte_alloc_one+0x16/0x1a0 [ 1278.708204] __pte_alloc+0x1d/0x330 [ 1278.708734] handle_mm_fault+0x287f/0x3500 [ 1278.709346] ? perf_trace_lock+0xac/0x490 [ 1278.709952] ? __lockdep_reset_lock+0x180/0x180 [ 1278.710622] ? __pmd_alloc+0x5e0/0x5e0 [ 1278.711213] __get_user_pages+0x6ec/0x1620 [ 1278.711833] ? follow_page_mask+0x1900/0x1900 [ 1278.712470] ? __lockdep_reset_lock+0x180/0x180 [ 1278.713135] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1278.713815] __get_user_pages_remote+0x1d5/0x870 [ 1278.714493] ? lock_downgrade+0x6d0/0x6d0 [ 1278.715101] get_user_pages_remote+0x63/0x90 [ 1278.715747] get_arg_page+0xba/0x200 [ 1278.716287] ? acct_arg_size+0xe0/0xe0 [ 1278.716849] ? downgrade_write+0x3a0/0x3a0 [ 1278.717452] ? count.constprop.0+0x1b3/0x290 [ 1278.718088] copy_string_kernel+0x1b4/0x450 [ 1278.718719] do_execveat_common+0x525/0x8d0 [ 1278.719353] ? bprm_execve+0x1960/0x1960 [ 1278.719953] __x64_sys_execveat+0xed/0x140 [ 1278.720567] do_syscall_64+0x33/0x40 [ 1278.721103] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1278.721833] RIP: 0033:0x7f1b403e0b19 [ 1278.722377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1278.724971] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1278.726061] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1278.727083] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1278.728098] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1278.729112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1278.730120] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1278.731281] hpet: Lost 1 RTC interrupts [ 1278.740596] FAULT_INJECTION: forcing a failure. [ 1278.740596] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.742352] CPU: 0 PID: 19405 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1278.743371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1278.744573] Call Trace: [ 1278.744968] dump_stack+0x107/0x167 [ 1278.745522] should_fail.cold+0x5/0xa [ 1278.746091] ? create_object.isra.0+0x3a/0xa20 [ 1278.746775] should_failslab+0x5/0x20 [ 1278.747358] kmem_cache_alloc+0x5b/0x310 [ 1278.748001] create_object.isra.0+0x3a/0xa20 [ 1278.748655] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1278.749410] kmem_cache_alloc+0x159/0x310 [ 1278.750036] vm_area_alloc+0x1c/0x110 [ 1278.750601] alloc_bprm+0x337/0x8f0 [ 1278.751143] ? __virt_addr_valid+0x170/0x5d0 [ 1278.751806] do_execveat_common+0x275/0x8d0 [ 1278.752447] ? strncpy_from_user+0x9e/0x470 [ 1278.753086] ? bprm_execve+0x1960/0x1960 [ 1278.753729] __x64_sys_execveat+0xed/0x140 [ 1278.754359] do_syscall_64+0x33/0x40 [ 1278.754925] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1278.755673] RIP: 0033:0x7fa24edbfb19 [ 1278.756220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1278.758863] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1278.759975] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1278.761011] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1278.762051] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1278.763088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1278.764125] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1278.765309] hpet: Lost 1 RTC interrupts 01:26:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 01:26:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 01:26:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 01:26:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002) 01:26:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) [ 1278.921260] FAULT_INJECTION: forcing a failure. [ 1278.921260] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.922290] CPU: 1 PID: 19889 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1278.922856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1278.923534] Call Trace: [ 1278.923763] dump_stack+0x107/0x167 [ 1278.924069] should_fail.cold+0x5/0xa [ 1278.924390] ? security_file_alloc+0x34/0x170 [ 1278.924764] should_failslab+0x5/0x20 [ 1278.925080] kmem_cache_alloc+0x5b/0x310 [ 1278.925423] security_file_alloc+0x34/0x170 [ 1278.925787] __alloc_file+0xb7/0x320 [ 1278.926097] alloc_empty_file+0x6d/0x170 [ 1278.926434] path_openat+0xe6/0x2770 [ 1278.926751] ? lock_chain_count+0x20/0x20 [ 1278.927103] ? stack_trace_consume_entry+0x160/0x160 [ 1278.927519] ? path_lookupat+0x860/0x860 [ 1278.927863] ? kasan_save_stack+0x32/0x40 [ 1278.928203] ? kasan_save_stack+0x1b/0x40 [ 1278.928545] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1278.928956] ? security_prepare_creds+0x112/0x190 [ 1278.929349] ? prepare_creds+0x452/0x5e0 [ 1278.929681] ? prepare_exec_creds+0xd/0x260 [ 1278.930046] do_filp_open+0x190/0x3e0 [ 1278.930361] ? may_open_dev+0xf0/0xf0 [ 1278.930679] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1278.931107] ? perf_trace_lock+0x2bd/0x490 [ 1278.931468] ? __lockdep_reset_lock+0x180/0x180 [ 1278.931864] ? find_held_lock+0x2c/0x110 [ 1278.932234] do_open_execat+0x116/0x750 [ 1278.932586] ? bprm_execve+0x49d/0x1960 [ 1278.932947] ? __do_sys_uselib+0x680/0x680 [ 1278.933316] ? do_raw_spin_lock+0x121/0x260 [ 1278.933682] ? rwlock_bug.part.0+0x90/0x90 [ 1278.934074] bprm_execve+0x4dc/0x1960 [ 1278.934418] ? count.constprop.0+0x1b3/0x290 [ 1278.934795] ? open_exec+0x70/0x70 [ 1278.935197] ? copy_string_kernel+0x3b6/0x450 [ 1278.935608] do_execveat_common+0x772/0x8d0 [ 1278.935997] ? bprm_execve+0x1960/0x1960 [ 1278.936385] __x64_sys_execveat+0xed/0x140 [ 1278.936770] do_syscall_64+0x33/0x40 [ 1278.937096] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1278.937532] RIP: 0033:0x7f1d9af7cb19 [ 1278.937856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1278.939358] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1278.939990] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1278.940564] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1278.941151] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1278.941733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1278.942329] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1278.947428] FAULT_INJECTION: forcing a failure. [ 1278.947428] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.949179] CPU: 0 PID: 19921 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1278.950173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1278.951384] Call Trace: [ 1278.951774] dump_stack+0x107/0x167 [ 1278.952301] should_fail.cold+0x5/0xa [ 1278.952856] ? ptlock_alloc+0x1d/0x70 [ 1278.953410] should_failslab+0x5/0x20 [ 1278.953965] kmem_cache_alloc+0x5b/0x310 [ 1278.954553] ptlock_alloc+0x1d/0x70 [ 1278.955087] pte_alloc_one+0x68/0x1a0 [ 1278.955645] __pte_alloc+0x1d/0x330 [ 1278.956180] handle_mm_fault+0x287f/0x3500 [ 1278.956793] ? perf_trace_lock+0xac/0x490 01:26:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 01:26:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) [ 1278.957389] ? __lockdep_reset_lock+0x180/0x180 [ 1278.958184] ? __pmd_alloc+0x5e0/0x5e0 [ 1278.958771] __get_user_pages+0x6ec/0x1620 [ 1278.959400] ? follow_page_mask+0x1900/0x1900 [ 1278.960047] ? __lockdep_reset_lock+0x180/0x180 [ 1278.960717] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1278.961399] __get_user_pages_remote+0x1d5/0x870 [ 1278.962084] ? lock_downgrade+0x6d0/0x6d0 [ 1278.962694] get_user_pages_remote+0x63/0x90 [ 1278.963334] get_arg_page+0xba/0x200 [ 1278.963878] ? acct_arg_size+0xe0/0xe0 [ 1278.964440] ? downgrade_write+0x3a0/0x3a0 [ 1278.965054] ? count.constprop.0+0x1b3/0x290 [ 1278.965699] copy_string_kernel+0x1b4/0x450 [ 1278.966331] do_execveat_common+0x525/0x8d0 [ 1278.966956] ? bprm_execve+0x1960/0x1960 [ 1278.967563] __x64_sys_execveat+0xed/0x140 [ 1278.968182] do_syscall_64+0x33/0x40 [ 1278.968725] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1278.969459] RIP: 0033:0x7f1b403e0b19 [ 1278.970007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1278.972626] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1278.973714] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1278.974737] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1278.975760] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1278.976838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1278.977898] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1278.979115] hpet: Lost 1 RTC interrupts 01:26:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) [ 1279.010876] FAULT_INJECTION: forcing a failure. [ 1279.010876] name fail_page_alloc, interval 1, probability 0, space 0, times 0 01:26:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) [ 1279.012643] CPU: 0 PID: 19928 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1279.013805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1279.015009] Call Trace: [ 1279.015415] dump_stack+0x107/0x167 [ 1279.015957] should_fail.cold+0x5/0xa [ 1279.016533] __alloc_pages_nodemask+0x182/0x600 [ 1279.017218] ? __lockdep_reset_lock+0x180/0x180 [ 1279.017907] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1279.018783] ? add_mm_counter_fast+0x220/0x220 [ 1279.019486] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1279.020262] alloc_pages_current+0x187/0x280 [ 1279.020918] get_zeroed_page+0x14/0xb0 [ 1279.021489] __pud_alloc+0x33/0x270 [ 1279.022041] handle_mm_fault+0x1a73/0x3500 [ 1279.022671] ? perf_trace_lock+0x2bd/0x490 [ 1279.023297] ? perf_trace_lock+0x2bd/0x490 [ 1279.023923] ? __pmd_alloc+0x5e0/0x5e0 [ 1279.024542] __get_user_pages+0x6ec/0x1620 [ 1279.025187] ? follow_page_mask+0x1900/0x1900 [ 1279.025844] ? __lockdep_reset_lock+0x180/0x180 [ 1279.026528] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1279.027252] __get_user_pages_remote+0x1d5/0x870 [ 1279.027948] ? lock_downgrade+0x6d0/0x6d0 [ 1279.028575] get_user_pages_remote+0x63/0x90 [ 1279.029238] get_arg_page+0xba/0x200 [ 1279.029787] ? acct_arg_size+0xe0/0xe0 [ 1279.030355] ? downgrade_write+0x3a0/0x3a0 [ 1279.030979] ? count.constprop.0+0x1b3/0x290 [ 1279.031639] copy_string_kernel+0x1b4/0x450 [ 1279.032287] do_execveat_common+0x525/0x8d0 [ 1279.032925] ? bprm_execve+0x1960/0x1960 [ 1279.033553] __x64_sys_execveat+0xed/0x140 [ 1279.034176] do_syscall_64+0x33/0x40 [ 1279.034720] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1279.035462] RIP: 0033:0x7fa24edbfb19 [ 1279.036005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1279.038625] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1279.039744] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1279.040780] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1279.041813] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1279.042845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1279.043885] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1279.045136] hpet: Lost 2 RTC interrupts 01:26:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 01:26:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a) 01:26:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 01:26:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) [ 1279.206398] FAULT_INJECTION: forcing a failure. [ 1279.206398] name failslab, interval 1, probability 0, space 0, times 0 [ 1279.207361] CPU: 1 PID: 20532 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1279.207887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1279.208507] Call Trace: [ 1279.208725] dump_stack+0x107/0x167 [ 1279.209010] should_fail.cold+0x5/0xa [ 1279.209307] ? create_object.isra.0+0x3a/0xa20 [ 1279.209659] should_failslab+0x5/0x20 [ 1279.209953] kmem_cache_alloc+0x5b/0x310 [ 1279.210265] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1279.210692] create_object.isra.0+0x3a/0xa20 [ 1279.211030] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1279.211428] kmem_cache_alloc+0x159/0x310 [ 1279.211761] security_file_alloc+0x34/0x170 [ 1279.212094] __alloc_file+0xb7/0x320 [ 1279.212383] alloc_empty_file+0x6d/0x170 [ 1279.212697] path_openat+0xe6/0x2770 [ 1279.213008] ? lock_chain_count+0x20/0x20 [ 1279.213330] ? stack_trace_consume_entry+0x160/0x160 [ 1279.213720] ? path_lookupat+0x860/0x860 [ 1279.214044] ? kasan_save_stack+0x32/0x40 [ 1279.214361] ? kasan_save_stack+0x1b/0x40 [ 1279.214685] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1279.215068] ? security_prepare_creds+0x112/0x190 [ 1279.215445] ? prepare_creds+0x452/0x5e0 [ 1279.215760] ? prepare_exec_creds+0xd/0x260 [ 1279.216098] do_filp_open+0x190/0x3e0 [ 1279.216481] ? may_open_dev+0xf0/0xf0 [ 1279.216782] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1279.217171] ? perf_trace_lock+0x2bd/0x490 [ 1279.217509] ? __lockdep_reset_lock+0x180/0x180 [ 1279.217877] ? find_held_lock+0x2c/0x110 [ 1279.218195] do_open_execat+0x116/0x750 [ 1279.218499] ? bprm_execve+0x49d/0x1960 [ 1279.218806] ? __do_sys_uselib+0x680/0x680 [ 1279.219141] ? do_raw_spin_lock+0x121/0x260 [ 1279.219473] ? rwlock_bug.part.0+0x90/0x90 [ 1279.219819] bprm_execve+0x4dc/0x1960 [ 1279.220123] ? count.constprop.0+0x1b3/0x290 [ 1279.220474] ? open_exec+0x70/0x70 [ 1279.220751] ? copy_string_kernel+0x3b6/0x450 [ 1279.221117] do_execveat_common+0x772/0x8d0 [ 1279.221450] ? bprm_execve+0x1960/0x1960 [ 1279.221780] __x64_sys_execveat+0xed/0x140 [ 1279.222110] do_syscall_64+0x33/0x40 [ 1279.222397] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1279.222783] RIP: 0033:0x7f1d9af7cb19 [ 1279.223081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1279.224451] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1279.225024] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1279.225560] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1279.226090] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1279.226629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1279.227176] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:26:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) 01:26:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) 01:26:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) 01:26:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 01:26:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xaf2) 01:26:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 01:26:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1517f) 01:26:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 01:26:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) [ 1294.266677] FAULT_INJECTION: forcing a failure. [ 1294.266677] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1294.267893] CPU: 1 PID: 20868 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1294.268544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1294.269318] Call Trace: [ 1294.269579] dump_stack+0x107/0x167 [ 1294.269932] should_fail.cold+0x5/0xa [ 1294.270301] __alloc_pages_nodemask+0x182/0x600 [ 1294.270755] ? lock_acquire+0x197/0x470 [ 1294.271176] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1294.271751] ? lock_downgrade+0x6d0/0x6d0 [ 1294.272184] ? do_raw_spin_lock+0x121/0x260 [ 1294.272599] alloc_pages_current+0x187/0x280 [ 1294.273167] __pmd_alloc+0x37/0x5e0 [ 1294.273558] handle_mm_fault+0x1ac4/0x3500 [ 1294.274005] ? register_lock_class+0xbb/0x17b0 [ 1294.274436] ? perf_trace_lock+0xac/0x490 [ 1294.274868] ? __lockdep_reset_lock+0x180/0x180 [ 1294.275359] ? __pmd_alloc+0x5e0/0x5e0 [ 1294.275784] __get_user_pages+0x6ec/0x1620 [ 1294.276235] ? follow_page_mask+0x1900/0x1900 [ 1294.276701] ? __lockdep_reset_lock+0x180/0x180 [ 1294.277192] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1294.277676] __get_user_pages_remote+0x1d5/0x870 [ 1294.278175] ? lock_downgrade+0x6d0/0x6d0 [ 1294.278618] get_user_pages_remote+0x63/0x90 [ 1294.279085] get_arg_page+0xba/0x200 [ 1294.279480] ? acct_arg_size+0xe0/0xe0 [ 1294.279885] ? downgrade_write+0x3a0/0x3a0 [ 1294.280326] ? count.constprop.0+0x1b3/0x290 [ 1294.280793] copy_string_kernel+0x1b4/0x450 [ 1294.281250] do_execveat_common+0x525/0x8d0 [ 1294.281703] ? bprm_execve+0x1960/0x1960 [ 1294.282147] __x64_sys_execveat+0xed/0x140 [ 1294.282600] do_syscall_64+0x33/0x40 [ 1294.282983] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1294.283526] RIP: 0033:0x7fa24edbfb19 [ 1294.283915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1294.285680] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1294.286399] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1294.287068] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1294.287811] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1294.288544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1294.289297] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1294.302940] FAULT_INJECTION: forcing a failure. [ 1294.302940] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.305004] CPU: 0 PID: 20877 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1294.306058] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1294.307308] Call Trace: [ 1294.307722] dump_stack+0x107/0x167 [ 1294.308268] should_fail.cold+0x5/0xa [ 1294.308851] ? create_object.isra.0+0x3a/0xa20 [ 1294.309528] should_failslab+0x5/0x20 [ 1294.310072] kmem_cache_alloc+0x5b/0x310 [ 1294.310670] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1294.311560] create_object.isra.0+0x3a/0xa20 [ 1294.312234] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1294.312983] kmem_cache_alloc+0x159/0x310 [ 1294.313618] ptlock_alloc+0x1d/0x70 [ 1294.314178] pte_alloc_one+0x68/0x1a0 [ 1294.314742] __pte_alloc+0x1d/0x330 [ 1294.315306] handle_mm_fault+0x287f/0x3500 [ 1294.315957] ? perf_trace_lock+0xac/0x490 [ 1294.316594] ? __lockdep_reset_lock+0x180/0x180 [ 1294.317307] ? __pmd_alloc+0x5e0/0x5e0 [ 1294.317927] __get_user_pages+0x6ec/0x1620 [ 1294.318587] ? follow_page_mask+0x1900/0x1900 [ 1294.319278] ? __lockdep_reset_lock+0x180/0x180 [ 1294.320021] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1294.320744] __get_user_pages_remote+0x1d5/0x870 [ 1294.321467] ? lock_downgrade+0x6d0/0x6d0 [ 1294.322108] get_user_pages_remote+0x63/0x90 [ 1294.322771] get_arg_page+0xba/0x200 [ 1294.323350] ? acct_arg_size+0xe0/0xe0 [ 1294.323944] ? downgrade_write+0x3a0/0x3a0 [ 1294.324595] ? count.constprop.0+0x1b3/0x290 [ 1294.325273] copy_string_kernel+0x1b4/0x450 [ 1294.325944] do_execveat_common+0x525/0x8d0 [ 1294.326600] ? bprm_execve+0x1960/0x1960 [ 1294.327231] __x64_sys_execveat+0xed/0x140 [ 1294.327879] do_syscall_64+0x33/0x40 [ 1294.328414] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1294.329192] RIP: 0033:0x7f1b403e0b19 [ 1294.329728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1294.332516] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1294.333681] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1294.334764] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1294.335839] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1294.336912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1294.338002] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1294.339180] hpet: Lost 1 RTC interrupts [ 1294.349584] FAULT_INJECTION: forcing a failure. [ 1294.349584] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.350754] CPU: 1 PID: 20873 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1294.351512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1294.352352] Call Trace: [ 1294.352621] dump_stack+0x107/0x167 [ 1294.352996] should_fail.cold+0x5/0xa [ 1294.353380] ? jbd2__journal_start+0x190/0x7e0 [ 1294.353840] should_failslab+0x5/0x20 [ 1294.354225] kmem_cache_alloc+0x5b/0x310 [ 1294.354639] jbd2__journal_start+0x190/0x7e0 [ 1294.355094] __ext4_journal_start_sb+0x214/0x390 [ 1294.355580] ext4_dirty_inode+0xbc/0x130 [ 1294.355988] ? ext4_setattr+0x2160/0x2160 [ 1294.356374] __mark_inode_dirty+0x492/0xd40 [ 1294.356820] touch_atime+0x5ea/0x6e0 [ 1294.357172] ? atime_needs_update+0x600/0x600 [ 1294.357628] ? mark_page_accessed+0x125/0x10d0 [ 1294.358092] generic_file_buffered_read+0x191a/0x2920 [ 1294.358602] ? pagecache_get_page+0xc80/0xc80 [ 1294.359043] generic_file_read_iter+0x33f/0x490 [ 1294.359524] ext4_file_read_iter+0x184/0x4c0 [ 1294.359965] __kernel_read+0x593/0xb30 [ 1294.360341] ? do_sendfile+0x11e0/0x11e0 [ 1294.360739] ? fsnotify_perm.part.0+0x22d/0x620 [ 1294.361178] ? security_file_permission+0xb1/0xe0 [ 1294.361636] kernel_read+0x52/0x70 [ 1294.361972] bprm_execve+0x767/0x1960 [ 1294.362354] ? open_exec+0x70/0x70 [ 1294.362687] ? copy_string_kernel+0x3b6/0x450 [ 1294.363119] do_execveat_common+0x772/0x8d0 [ 1294.363532] ? bprm_execve+0x1960/0x1960 [ 1294.363933] __x64_sys_execveat+0xed/0x140 [ 1294.364332] do_syscall_64+0x33/0x40 [ 1294.364684] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1294.365158] RIP: 0033:0x7f1d9af7cb19 [ 1294.365513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1294.367320] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1294.368074] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1294.368780] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1294.369479] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1294.370179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1294.370873] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:26:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 01:26:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 01:26:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 01:26:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 01:26:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 01:26:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) 01:26:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 01:26:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) [ 1309.357355] FAULT_INJECTION: forcing a failure. [ 1309.357355] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.359587] CPU: 0 PID: 21393 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1309.360798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1309.362235] Call Trace: [ 1309.362727] dump_stack+0x107/0x167 [ 1309.363386] should_fail.cold+0x5/0xa [ 1309.364071] ? __pmd_alloc+0x94/0x5e0 [ 1309.364753] should_failslab+0x5/0x20 [ 1309.365427] kmem_cache_alloc+0x5b/0x310 [ 1309.366208] __pmd_alloc+0x94/0x5e0 [ 1309.366867] handle_mm_fault+0x1ac4/0x3500 [ 1309.367635] ? perf_trace_lock+0x2bd/0x490 [ 1309.368387] ? __lockdep_reset_lock+0x180/0x180 [ 1309.369212] ? __pmd_alloc+0x5e0/0x5e0 [ 1309.369957] __get_user_pages+0x6ec/0x1620 [ 1309.370734] ? follow_page_mask+0x1900/0x1900 [ 1309.371545] ? __lockdep_reset_lock+0x180/0x180 [ 1309.372332] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1309.373046] __get_user_pages_remote+0x1d5/0x870 [ 1309.373744] ? lock_downgrade+0x6d0/0x6d0 [ 1309.374376] get_user_pages_remote+0x63/0x90 [ 1309.375035] get_arg_page+0xba/0x200 [ 1309.375600] ? acct_arg_size+0xe0/0xe0 [ 1309.376167] ? downgrade_write+0x3a0/0x3a0 [ 1309.376801] ? count.constprop.0+0x1b3/0x290 [ 1309.377458] copy_string_kernel+0x1b4/0x450 [ 1309.378110] do_execveat_common+0x525/0x8d0 [ 1309.378758] ? bprm_execve+0x1960/0x1960 [ 1309.379411] __x64_sys_execveat+0xed/0x140 [ 1309.380043] do_syscall_64+0x33/0x40 [ 1309.380593] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1309.381338] RIP: 0033:0x7fa24edbfb19 [ 1309.381881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1309.384508] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1309.385613] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1309.386632] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1309.387667] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1309.388696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1309.389726] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1309.390926] hpet: Lost 1 RTC interrupts [ 1309.394770] FAULT_INJECTION: forcing a failure. [ 1309.394770] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.396686] CPU: 1 PID: 21402 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1309.397791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1309.398989] Call Trace: [ 1309.399402] dump_stack+0x107/0x167 [ 1309.399944] should_fail.cold+0x5/0xa [ 1309.400512] ? __anon_vma_prepare+0x62/0x500 [ 1309.401160] should_failslab+0x5/0x20 [ 1309.401727] kmem_cache_alloc+0x5b/0x310 [ 1309.402336] __anon_vma_prepare+0x62/0x500 [ 1309.402951] ? __pte_alloc+0x194/0x330 [ 1309.403545] handle_mm_fault+0x2b2d/0x3500 [ 1309.404178] ? perf_trace_lock+0xac/0x490 [ 1309.404789] ? __lockdep_reset_lock+0x180/0x180 [ 1309.405469] ? __pmd_alloc+0x5e0/0x5e0 [ 1309.406065] __get_user_pages+0x6ec/0x1620 [ 1309.406700] ? follow_page_mask+0x1900/0x1900 [ 1309.407361] ? __lockdep_reset_lock+0x180/0x180 [ 1309.408056] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1309.408752] __get_user_pages_remote+0x1d5/0x870 [ 1309.409446] ? lock_downgrade+0x6d0/0x6d0 [ 1309.410065] get_user_pages_remote+0x63/0x90 [ 1309.410725] get_arg_page+0xba/0x200 [ 1309.411278] ? acct_arg_size+0xe0/0xe0 [ 1309.411858] ? downgrade_write+0x3a0/0x3a0 [ 1309.412475] ? count.constprop.0+0x1b3/0x290 [ 1309.413245] copy_string_kernel+0x1b4/0x450 [ 1309.413895] do_execveat_common+0x525/0x8d0 [ 1309.414525] ? bprm_execve+0x1960/0x1960 [ 1309.415142] __x64_sys_execveat+0xed/0x140 [ 1309.415773] do_syscall_64+0x33/0x40 [ 1309.416330] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1309.417079] RIP: 0033:0x7f1b403e0b19 [ 1309.417627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1309.420287] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1309.421397] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1309.422438] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1309.423486] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1309.424523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1309.425560] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1309.429449] FAULT_INJECTION: forcing a failure. [ 1309.429449] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.431246] CPU: 0 PID: 21399 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1309.432288] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1309.433475] Call Trace: [ 1309.433868] dump_stack+0x107/0x167 [ 1309.434412] should_fail.cold+0x5/0xa [ 1309.434980] ? jbd2__journal_start+0x190/0x7e0 [ 1309.435665] should_failslab+0x5/0x20 [ 1309.436225] kmem_cache_alloc+0x5b/0x310 [ 1309.436835] jbd2__journal_start+0x190/0x7e0 [ 1309.437501] __ext4_journal_start_sb+0x214/0x390 [ 1309.438216] ext4_dirty_inode+0xbc/0x130 [ 1309.438820] ? ext4_setattr+0x2160/0x2160 [ 1309.439437] __mark_inode_dirty+0x492/0xd40 [ 1309.440084] touch_atime+0x5ea/0x6e0 [ 1309.440641] ? atime_needs_update+0x600/0x600 [ 1309.441309] ? mark_page_accessed+0x125/0x10d0 [ 1309.442004] generic_file_buffered_read+0x191a/0x2920 [ 1309.442803] ? pagecache_get_page+0xc80/0xc80 [ 1309.443513] generic_file_read_iter+0x33f/0x490 [ 1309.444248] ext4_file_read_iter+0x184/0x4c0 [ 1309.444910] __kernel_read+0x593/0xb30 [ 1309.445490] ? do_sendfile+0x11e0/0x11e0 [ 1309.446120] ? fsnotify_perm.part.0+0x22d/0x620 [ 1309.446815] ? security_file_permission+0xb1/0xe0 [ 1309.447552] kernel_read+0x52/0x70 [ 1309.448083] bprm_execve+0x767/0x1960 [ 1309.448667] ? open_exec+0x70/0x70 [ 1309.449197] ? copy_string_kernel+0x3b6/0x450 [ 1309.449886] do_execveat_common+0x772/0x8d0 [ 1309.450527] ? bprm_execve+0x1960/0x1960 [ 1309.451161] __x64_sys_execveat+0xed/0x140 [ 1309.451800] do_syscall_64+0x33/0x40 [ 1309.452352] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1309.453097] RIP: 0033:0x7f1d9af7cb19 [ 1309.453642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1309.456285] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1309.457395] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1309.458426] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1309.459470] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1309.460499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1309.461536] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1309.462727] hpet: Lost 1 RTC interrupts 01:26:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 01:26:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002) 01:26:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 01:26:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) 01:26:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) 01:26:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) [ 1309.601107] FAULT_INJECTION: forcing a failure. [ 1309.601107] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.602979] CPU: 1 PID: 21909 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1309.603992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1309.605161] Call Trace: [ 1309.605552] dump_stack+0x107/0x167 [ 1309.606081] should_fail.cold+0x5/0xa [ 1309.606635] ? create_object.isra.0+0x3a/0xa20 [ 1309.607303] should_failslab+0x5/0x20 [ 1309.607874] kmem_cache_alloc+0x5b/0x310 [ 1309.608465] create_object.isra.0+0x3a/0xa20 [ 1309.609101] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1309.609844] kmem_cache_alloc+0x159/0x310 [ 1309.610472] __pmd_alloc+0x94/0x5e0 [ 1309.611001] handle_mm_fault+0x1ac4/0x3500 [ 1309.611625] ? register_lock_class+0xbb/0x17b0 [ 1309.612285] ? perf_trace_lock+0xac/0x490 [ 1309.612879] ? __lockdep_reset_lock+0x180/0x180 [ 1309.613556] ? __pmd_alloc+0x5e0/0x5e0 [ 1309.614140] __get_user_pages+0x6ec/0x1620 [ 1309.614766] ? follow_page_mask+0x1900/0x1900 [ 1309.615439] ? __lockdep_reset_lock+0x180/0x180 [ 1309.616132] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1309.616942] __get_user_pages_remote+0x1d5/0x870 [ 1309.617632] ? lock_downgrade+0x6d0/0x6d0 [ 1309.618234] get_user_pages_remote+0x63/0x90 [ 1309.618876] get_arg_page+0xba/0x200 [ 1309.619425] ? acct_arg_size+0xe0/0xe0 [ 1309.619985] ? downgrade_write+0x3a0/0x3a0 [ 1309.620605] ? count.constprop.0+0x1b3/0x290 [ 1309.621245] copy_string_kernel+0x1b4/0x450 [ 1309.621882] do_execveat_common+0x525/0x8d0 [ 1309.622520] ? bprm_execve+0x1960/0x1960 [ 1309.623129] __x64_sys_execveat+0xed/0x140 [ 1309.623757] do_syscall_64+0x33/0x40 [ 1309.624304] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1309.625042] RIP: 0033:0x7fa24edbfb19 [ 1309.625584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1309.628202] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1309.628638] FAULT_INJECTION: forcing a failure. [ 1309.628638] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.629298] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1309.629311] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1309.629331] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1309.634043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1309.635056] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1309.636113] CPU: 0 PID: 21913 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1309.637107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1309.638287] Call Trace: [ 1309.638672] dump_stack+0x107/0x167 [ 1309.639198] should_fail.cold+0x5/0xa [ 1309.639763] ? create_object.isra.0+0x3a/0xa20 [ 1309.640419] should_failslab+0x5/0x20 [ 1309.640968] kmem_cache_alloc+0x5b/0x310 [ 1309.641555] create_object.isra.0+0x3a/0xa20 [ 1309.642183] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1309.642910] kmem_cache_alloc+0x159/0x310 [ 1309.643518] __anon_vma_prepare+0x62/0x500 [ 1309.644120] ? __pte_alloc+0x194/0x330 [ 1309.644681] handle_mm_fault+0x2b2d/0x3500 [ 1309.645290] ? perf_trace_lock+0xac/0x490 [ 1309.645879] ? __lockdep_reset_lock+0x180/0x180 [ 1309.646542] ? __pmd_alloc+0x5e0/0x5e0 [ 1309.647122] __get_user_pages+0x6ec/0x1620 [ 1309.647790] ? follow_page_mask+0x1900/0x1900 [ 1309.648433] ? __lockdep_reset_lock+0x180/0x180 [ 1309.649096] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1309.649777] __get_user_pages_remote+0x1d5/0x870 [ 1309.650452] ? lock_downgrade+0x6d0/0x6d0 [ 1309.651053] get_user_pages_remote+0x63/0x90 [ 1309.651703] get_arg_page+0xba/0x200 [ 1309.652235] ? acct_arg_size+0xe0/0xe0 [ 1309.652786] ? downgrade_write+0x3a0/0x3a0 [ 1309.653391] ? count.constprop.0+0x1b3/0x290 [ 1309.654021] copy_string_kernel+0x1b4/0x450 [ 1309.654645] do_execveat_common+0x525/0x8d0 [ 1309.655278] ? bprm_execve+0x1960/0x1960 [ 1309.655881] __x64_sys_execveat+0xed/0x140 [ 1309.656489] do_syscall_64+0x33/0x40 [ 1309.657022] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1309.657755] RIP: 0033:0x7f1b403e0b19 [ 1309.658285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1309.660873] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1309.661952] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1309.662963] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1309.663977] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1309.664986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1309.665994] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1309.667117] hpet: Lost 1 RTC interrupts 01:26:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 01:26:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a) 01:26:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 01:26:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 01:26:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 01:26:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 01:26:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) [ 1309.998125] FAULT_INJECTION: forcing a failure. [ 1309.998125] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1310.000043] CPU: 0 PID: 22479 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1310.001025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1310.002192] Call Trace: [ 1310.002579] dump_stack+0x107/0x167 [ 1310.003108] should_fail.cold+0x5/0xa [ 1310.003677] __alloc_pages_nodemask+0x182/0x600 [ 1310.004352] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1310.005200] ? find_held_lock+0x2c/0x110 [ 1310.005795] ? __pmd_alloc+0x2db/0x5e0 [ 1310.006352] ? lock_downgrade+0x6d0/0x6d0 [ 1310.006957] ? do_raw_spin_lock+0x121/0x260 [ 1310.007628] alloc_pages_current+0x187/0x280 [ 1310.008285] pte_alloc_one+0x16/0x1a0 [ 1310.008837] __pte_alloc+0x1d/0x330 [ 1310.009368] handle_mm_fault+0x287f/0x3500 [ 1310.009985] ? perf_trace_lock+0x2bd/0x490 [ 1310.010604] ? __lockdep_reset_lock+0x180/0x180 [ 1310.011289] ? __pmd_alloc+0x5e0/0x5e0 [ 1310.011928] __get_user_pages+0x6ec/0x1620 [ 1310.012571] ? follow_page_mask+0x1900/0x1900 [ 1310.013238] ? __lockdep_reset_lock+0x180/0x180 [ 1310.013927] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1310.014643] __get_user_pages_remote+0x1d5/0x870 [ 1310.015353] ? lock_downgrade+0x6d0/0x6d0 [ 1310.015988] get_user_pages_remote+0x63/0x90 [ 1310.016654] get_arg_page+0xba/0x200 [ 1310.017209] ? acct_arg_size+0xe0/0xe0 [ 1310.017787] ? downgrade_write+0x3a0/0x3a0 [ 1310.018421] ? count.constprop.0+0x1b3/0x290 [ 1310.019084] copy_string_kernel+0x1b4/0x450 [ 1310.019754] do_execveat_common+0x525/0x8d0 [ 1310.020403] ? bprm_execve+0x1960/0x1960 [ 1310.021039] __x64_sys_execveat+0xed/0x140 [ 1310.021680] do_syscall_64+0x33/0x40 [ 1310.022238] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1310.022991] RIP: 0033:0x7fa24edbfb19 [ 1310.023548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1310.026111] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1310.027183] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1310.028219] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1310.029251] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1310.030292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1310.031326] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1310.032511] hpet: Lost 1 RTC interrupts [ 1310.046087] FAULT_INJECTION: forcing a failure. [ 1310.046087] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.047909] CPU: 0 PID: 22462 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1310.048941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1310.050156] Call Trace: [ 1310.050556] dump_stack+0x107/0x167 [ 1310.051105] should_fail.cold+0x5/0xa [ 1310.051690] ? __request_module+0x2e0/0x920 [ 1310.052337] ? bprm_execve+0x9a0/0x1960 [ 1310.052935] should_failslab+0x5/0x20 [ 1310.053502] kmem_cache_alloc_trace+0x55/0x320 [ 1310.054230] ? bprm_execve+0x9a0/0x1960 [ 1310.054822] __request_module+0x2e0/0x920 [ 1310.055452] ? free_modprobe_argv+0x90/0x90 [ 1310.056097] ? __lockdep_reset_lock+0x180/0x180 [ 1310.056807] ? find_held_lock+0x2c/0x110 [ 1310.057424] ? bprm_execve+0x8f8/0x1960 [ 1310.058020] ? lock_downgrade+0x6d0/0x6d0 [ 1310.058634] ? elf_core_dump+0x3c50/0x3c50 [ 1310.059263] ? do_raw_read_unlock+0x3b/0x70 [ 1310.059906] ? _raw_read_unlock+0x1a/0x30 [ 1310.060517] ? load_misc_binary+0x605/0xb70 [ 1310.061175] bprm_execve+0x9a0/0x1960 [ 1310.061768] ? open_exec+0x70/0x70 [ 1310.062296] ? copy_string_kernel+0x3b6/0x450 [ 1310.062982] do_execveat_common+0x772/0x8d0 [ 1310.063645] ? bprm_execve+0x1960/0x1960 [ 1310.064281] __x64_sys_execveat+0xed/0x140 [ 1310.064922] do_syscall_64+0x33/0x40 [ 1310.065480] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1310.066233] RIP: 0033:0x7f1d9af7cb19 [ 1310.066788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1310.069469] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1310.070594] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1310.071655] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1310.072699] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1310.073745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1310.074794] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1310.075992] hpet: Lost 1 RTC interrupts [ 1331.105313] FAULT_INJECTION: forcing a failure. [ 1331.105313] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.107602] CPU: 0 PID: 22857 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1331.108833] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1331.110299] Call Trace: [ 1331.110783] dump_stack+0x107/0x167 [ 1331.111443] should_fail.cold+0x5/0xa [ 1331.112147] ? __request_module+0x2e0/0x920 [ 1331.112922] ? bprm_execve+0x9a0/0x1960 [ 1331.113674] should_failslab+0x5/0x20 [ 1331.114354] kmem_cache_alloc_trace+0x55/0x320 [ 1331.115181] ? bprm_execve+0x9a0/0x1960 [ 1331.115900] __request_module+0x2e0/0x920 [ 1331.116649] ? free_modprobe_argv+0x90/0x90 [ 1331.117419] ? __lockdep_reset_lock+0x180/0x180 [ 1331.118271] ? find_held_lock+0x2c/0x110 [ 1331.119005] ? bprm_execve+0x8f8/0x1960 [ 1331.119733] ? lock_downgrade+0x6d0/0x6d0 [ 1331.120464] ? elf_core_dump+0x3c50/0x3c50 [ 1331.121225] ? do_raw_read_unlock+0x3b/0x70 [ 1331.121992] ? _raw_read_unlock+0x1a/0x30 [ 1331.122735] ? load_misc_binary+0x605/0xb70 [ 1331.123542] bprm_execve+0x9a0/0x1960 [ 1331.124457] ? open_exec+0x70/0x70 [ 1331.125100] ? copy_string_kernel+0x3b6/0x450 [ 1331.125927] do_execveat_common+0x772/0x8d0 [ 1331.126715] ? bprm_execve+0x1960/0x1960 [ 1331.127487] __x64_sys_execveat+0xed/0x140 [ 1331.128262] do_syscall_64+0x33/0x40 [ 1331.128929] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1331.129832] RIP: 0033:0x7f1d9af7cb19 [ 1331.130500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1331.133483] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1331.134608] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1331.135667] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1331.136710] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1331.137761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1331.138813] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1331.140115] hpet: Lost 1 RTC interrupts 01:27:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 01:27:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 01:27:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 01:27:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 01:27:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3800) 01:27:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 01:27:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1517f) 01:27:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) [ 1331.162930] FAULT_INJECTION: forcing a failure. [ 1331.162930] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.164604] CPU: 0 PID: 23075 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1331.165632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1331.166846] Call Trace: [ 1331.167240] dump_stack+0x107/0x167 [ 1331.167788] should_fail.cold+0x5/0xa [ 1331.168359] ? __anon_vma_prepare+0x270/0x500 [ 1331.169024] should_failslab+0x5/0x20 [ 1331.169592] kmem_cache_alloc+0x5b/0x310 [ 1331.170201] __anon_vma_prepare+0x270/0x500 [ 1331.170844] ? __pte_alloc+0x194/0x330 [ 1331.171424] handle_mm_fault+0x2b2d/0x3500 [ 1331.172061] ? perf_trace_lock+0xac/0x490 [ 1331.172662] ? __lockdep_reset_lock+0x180/0x180 [ 1331.173352] ? __pmd_alloc+0x5e0/0x5e0 [ 1331.173949] __get_user_pages+0x6ec/0x1620 [ 1331.174585] ? follow_page_mask+0x1900/0x1900 [ 1331.175247] ? __lockdep_reset_lock+0x180/0x180 [ 1331.175975] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1331.176675] __get_user_pages_remote+0x1d5/0x870 [ 1331.177377] ? lock_downgrade+0x6d0/0x6d0 [ 1331.177992] get_user_pages_remote+0x63/0x90 [ 1331.178646] get_arg_page+0xba/0x200 [ 1331.179187] ? acct_arg_size+0xe0/0xe0 [ 1331.179773] ? downgrade_write+0x3a0/0x3a0 [ 1331.180396] ? count.constprop.0+0x1b3/0x290 [ 1331.181049] copy_string_kernel+0x1b4/0x450 [ 1331.181691] do_execveat_common+0x525/0x8d0 [ 1331.182335] ? bprm_execve+0x1960/0x1960 [ 1331.182952] __x64_sys_execveat+0xed/0x140 [ 1331.183583] do_syscall_64+0x33/0x40 [ 1331.184128] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1331.184884] RIP: 0033:0x7f1b403e0b19 [ 1331.185429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1331.188133] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1331.189251] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1331.190290] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1331.191334] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1331.192378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1331.193418] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1331.194597] hpet: Lost 1 RTC interrupts [ 1331.202839] FAULT_INJECTION: forcing a failure. [ 1331.202839] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.204715] CPU: 0 PID: 23142 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1331.205739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1331.206950] Call Trace: [ 1331.207378] dump_stack+0x107/0x167 [ 1331.207938] should_fail.cold+0x5/0xa [ 1331.208510] ? ptlock_alloc+0x1d/0x70 [ 1331.209085] should_failslab+0x5/0x20 [ 1331.209658] kmem_cache_alloc+0x5b/0x310 [ 1331.210282] ptlock_alloc+0x1d/0x70 [ 1331.210832] pte_alloc_one+0x68/0x1a0 [ 1331.211408] __pte_alloc+0x1d/0x330 [ 1331.211965] handle_mm_fault+0x287f/0x3500 [ 1331.212610] ? perf_trace_lock+0x2bd/0x490 [ 1331.213249] ? __lockdep_reset_lock+0x180/0x180 [ 1331.213946] ? __pmd_alloc+0x5e0/0x5e0 [ 1331.214581] __get_user_pages+0x6ec/0x1620 [ 1331.215232] ? follow_page_mask+0x1900/0x1900 [ 1331.215909] ? __lockdep_reset_lock+0x180/0x180 [ 1331.216597] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1331.217313] __get_user_pages_remote+0x1d5/0x870 [ 1331.218020] ? lock_downgrade+0x6d0/0x6d0 [ 1331.218655] get_user_pages_remote+0x63/0x90 [ 1331.219320] get_arg_page+0xba/0x200 [ 1331.219889] ? acct_arg_size+0xe0/0xe0 [ 1331.220468] ? downgrade_write+0x3a0/0x3a0 [ 1331.221100] ? count.constprop.0+0x1b3/0x290 [ 1331.221772] copy_string_kernel+0x1b4/0x450 [ 1331.222442] do_execveat_common+0x525/0x8d0 [ 1331.223092] ? bprm_execve+0x1960/0x1960 [ 1331.223737] __x64_sys_execveat+0xed/0x140 [ 1331.224376] do_syscall_64+0x33/0x40 [ 1331.224932] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1331.225680] RIP: 0033:0x7fa24edbfb19 [ 1331.226233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1331.228903] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1331.230027] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1331.231074] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1331.232113] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1331.233155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1331.234206] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1331.235411] hpet: Lost 1 RTC interrupts 01:27:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) 01:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) 01:27:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) 01:27:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 01:27:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 01:27:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000) 01:27:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) 01:27:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) [ 1344.292954] FAULT_INJECTION: forcing a failure. [ 1344.292954] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.293002] FAULT_INJECTION: forcing a failure. [ 1344.293002] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.294301] CPU: 1 PID: 23387 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1344.294311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.294316] Call Trace: [ 1344.294336] dump_stack+0x107/0x167 [ 1344.294351] should_fail.cold+0x5/0xa [ 1344.294369] ? create_object.isra.0+0x3a/0xa20 [ 1344.294386] should_failslab+0x5/0x20 [ 1344.294400] kmem_cache_alloc+0x5b/0x310 [ 1344.294423] create_object.isra.0+0x3a/0xa20 [ 1344.294449] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1344.301299] kmem_cache_alloc+0x159/0x310 [ 1344.301788] __anon_vma_prepare+0x270/0x500 [ 1344.302291] ? __pte_alloc+0x194/0x330 [ 1344.302743] handle_mm_fault+0x2b2d/0x3500 [ 1344.303235] ? perf_trace_lock+0xac/0x490 [ 1344.303724] ? __lockdep_reset_lock+0x180/0x180 [ 1344.304235] ? __pmd_alloc+0x5e0/0x5e0 [ 1344.304708] __get_user_pages+0x6ec/0x1620 [ 1344.305204] ? follow_page_mask+0x1900/0x1900 [ 1344.305721] ? __lockdep_reset_lock+0x180/0x180 [ 1344.306261] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1344.306808] __get_user_pages_remote+0x1d5/0x870 [ 1344.307361] ? lock_downgrade+0x6d0/0x6d0 [ 1344.307873] get_user_pages_remote+0x63/0x90 [ 1344.308384] get_arg_page+0xba/0x200 [ 1344.308816] ? acct_arg_size+0xe0/0xe0 [ 1344.309268] ? downgrade_write+0x3a0/0x3a0 [ 1344.309847] ? count.constprop.0+0x1b3/0x290 [ 1344.310359] copy_string_kernel+0x1b4/0x450 [ 1344.310862] do_execveat_common+0x525/0x8d0 [ 1344.311365] ? bprm_execve+0x1960/0x1960 [ 1344.311843] __x64_sys_execveat+0xed/0x140 [ 1344.312333] do_syscall_64+0x33/0x40 [ 1344.312762] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.313351] RIP: 0033:0x7f1b403e0b19 [ 1344.313793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.315909] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1344.316797] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1344.317610] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1344.318387] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.319202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1344.320032] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1344.320887] CPU: 0 PID: 23390 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1344.321925] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.323139] Call Trace: [ 1344.323543] dump_stack+0x107/0x167 [ 1344.324106] should_fail.cold+0x5/0xa [ 1344.324683] ? create_object.isra.0+0x3a/0xa20 [ 1344.325409] should_failslab+0x5/0x20 [ 1344.325979] kmem_cache_alloc+0x5b/0x310 [ 1344.326589] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1344.327485] create_object.isra.0+0x3a/0xa20 [ 1344.328149] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1344.328912] kmem_cache_alloc+0x159/0x310 [ 1344.329540] ptlock_alloc+0x1d/0x70 [ 1344.330091] pte_alloc_one+0x68/0x1a0 [ 1344.330662] __pte_alloc+0x1d/0x330 [ 1344.330703] FAULT_INJECTION: forcing a failure. [ 1344.330703] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.331212] handle_mm_fault+0x287f/0x3500 [ 1344.333049] ? perf_trace_lock+0x2bd/0x490 [ 1344.333677] ? __lockdep_reset_lock+0x180/0x180 [ 1344.334372] ? __pmd_alloc+0x5e0/0x5e0 [ 1344.335001] __get_user_pages+0x6ec/0x1620 [ 1344.335658] ? follow_page_mask+0x1900/0x1900 [ 1344.336324] ? __lockdep_reset_lock+0x180/0x180 [ 1344.337013] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1344.337739] __get_user_pages_remote+0x1d5/0x870 [ 1344.338446] ? lock_downgrade+0x6d0/0x6d0 [ 1344.339079] get_user_pages_remote+0x63/0x90 [ 1344.339755] get_arg_page+0xba/0x200 [ 1344.340316] ? acct_arg_size+0xe0/0xe0 [ 1344.340886] ? downgrade_write+0x3a0/0x3a0 [ 1344.341521] ? count.constprop.0+0x1b3/0x290 [ 1344.342184] copy_string_kernel+0x1b4/0x450 [ 1344.342847] do_execveat_common+0x525/0x8d0 [ 1344.343493] ? bprm_execve+0x1960/0x1960 [ 1344.344138] __x64_sys_execveat+0xed/0x140 [ 1344.344780] do_syscall_64+0x33/0x40 [ 1344.345330] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.346081] RIP: 0033:0x7fa24edbfb19 [ 1344.346630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.349289] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1344.350409] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1344.351442] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1344.352494] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.353539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1344.354583] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1344.355692] CPU: 1 PID: 23392 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1344.355873] hpet: Lost 1 RTC interrupts [ 1344.356589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.358182] Call Trace: [ 1344.358502] dump_stack+0x107/0x167 [ 1344.358928] should_fail.cold+0x5/0xa [ 1344.359390] ? bprm_execve+0x9a0/0x1960 [ 1344.359864] should_failslab+0x5/0x20 [ 1344.360305] __kmalloc_track_caller+0x79/0x370 [ 1344.360838] ? __request_module+0x2fe/0x920 [ 1344.361353] ? bprm_execve+0x9a0/0x1960 [ 1344.361819] kstrdup+0x36/0x70 [ 1344.362205] __request_module+0x2fe/0x920 [ 1344.362687] ? free_modprobe_argv+0x90/0x90 [ 1344.363190] ? __lockdep_reset_lock+0x180/0x180 [ 1344.363756] ? find_held_lock+0x2c/0x110 [ 1344.364239] ? bprm_execve+0x8f8/0x1960 [ 1344.364701] ? lock_downgrade+0x6d0/0x6d0 [ 1344.365187] ? elf_core_dump+0x3c50/0x3c50 [ 1344.365675] ? do_raw_read_unlock+0x3b/0x70 [ 1344.366174] ? _raw_read_unlock+0x1a/0x30 [ 1344.366659] ? load_misc_binary+0x605/0xb70 [ 1344.367180] bprm_execve+0x9a0/0x1960 [ 1344.367637] ? open_exec+0x70/0x70 [ 1344.368067] ? copy_string_kernel+0x3b6/0x450 [ 1344.368580] do_execveat_common+0x772/0x8d0 [ 1344.369089] ? bprm_execve+0x1960/0x1960 [ 1344.369593] __x64_sys_execveat+0xed/0x140 [ 1344.370091] do_syscall_64+0x33/0x40 [ 1344.370525] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.371112] RIP: 0033:0x7f1d9af7cb19 [ 1344.371552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.373752] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1344.374626] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1344.375448] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1344.376269] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.377088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1344.377861] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 01:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) 01:27:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 01:27:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 01:27:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 01:27:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) 01:27:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 01:27:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 01:27:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) [ 1344.664215] FAULT_INJECTION: forcing a failure. [ 1344.664215] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1344.665614] CPU: 1 PID: 24136 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1344.666331] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.667133] Call Trace: [ 1344.667417] dump_stack+0x107/0x167 [ 1344.667806] should_fail.cold+0x5/0xa [ 1344.668205] __alloc_pages_nodemask+0x182/0x600 [ 1344.668687] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1344.669304] ? up_write+0x191/0x550 [ 1344.669773] ? rwlock_bug.part.0+0x90/0x90 [ 1344.670220] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1344.670783] alloc_pages_vma+0xbb/0x410 [ 1344.671208] handle_mm_fault+0x152f/0x3500 [ 1344.671661] ? perf_trace_lock+0xac/0x490 [ 1344.672092] ? __lockdep_reset_lock+0x180/0x180 [ 1344.672540] ? __pmd_alloc+0x5e0/0x5e0 [ 1344.672961] __get_user_pages+0x6ec/0x1620 [ 1344.673403] ? follow_page_mask+0x1900/0x1900 [ 1344.673874] ? __lockdep_reset_lock+0x180/0x180 [ 1344.674344] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1344.674833] __get_user_pages_remote+0x1d5/0x870 [ 1344.675319] ? lock_downgrade+0x6d0/0x6d0 [ 1344.675762] get_user_pages_remote+0x63/0x90 [ 1344.676212] get_arg_page+0xba/0x200 [ 1344.676598] ? acct_arg_size+0xe0/0xe0 [ 1344.676996] ? downgrade_write+0x3a0/0x3a0 [ 1344.677443] ? count.constprop.0+0x1b3/0x290 [ 1344.677894] copy_string_kernel+0x1b4/0x450 [ 1344.678347] do_execveat_common+0x525/0x8d0 [ 1344.678803] ? bprm_execve+0x1960/0x1960 [ 1344.679238] __x64_sys_execveat+0xed/0x140 [ 1344.679681] do_syscall_64+0x33/0x40 [ 1344.680066] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.680583] RIP: 0033:0x7f1b403e0b19 [ 1344.680948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.682792] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1344.683564] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1344.684240] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1344.684956] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.685761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1344.686482] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1344.686983] FAULT_INJECTION: forcing a failure. [ 1344.686983] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.689083] CPU: 0 PID: 24226 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1344.690116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.691346] Call Trace: [ 1344.691770] dump_stack+0x107/0x167 [ 1344.692328] should_fail.cold+0x5/0xa [ 1344.692908] ? create_object.isra.0+0x3a/0xa20 [ 1344.693598] should_failslab+0x5/0x20 [ 1344.694174] kmem_cache_alloc+0x5b/0x310 [ 1344.694789] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1344.695702] create_object.isra.0+0x3a/0xa20 [ 1344.696367] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1344.697142] kmem_cache_alloc+0x159/0x310 [ 1344.697782] ptlock_alloc+0x1d/0x70 [ 1344.698324] pte_alloc_one+0x68/0x1a0 [ 1344.698902] __pte_alloc+0x1d/0x330 [ 1344.699459] handle_mm_fault+0x287f/0x3500 [ 1344.700115] ? perf_trace_lock+0x2bd/0x490 [ 1344.700754] ? __lockdep_reset_lock+0x180/0x180 [ 1344.701482] ? __pmd_alloc+0x5e0/0x5e0 [ 1344.702115] __get_user_pages+0x6ec/0x1620 [ 1344.702770] ? follow_page_mask+0x1900/0x1900 [ 1344.703443] ? __lockdep_reset_lock+0x180/0x180 [ 1344.704151] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1344.704880] __get_user_pages_remote+0x1d5/0x870 [ 1344.705594] ? lock_downgrade+0x6d0/0x6d0 [ 1344.706232] get_user_pages_remote+0x63/0x90 [ 1344.706905] get_arg_page+0xba/0x200 [ 1344.707470] ? acct_arg_size+0xe0/0xe0 [ 1344.708060] ? downgrade_write+0x3a0/0x3a0 [ 1344.708698] ? count.constprop.0+0x1b3/0x290 [ 1344.709356] copy_string_kernel+0x1b4/0x450 [ 1344.710026] do_execveat_common+0x525/0x8d0 [ 1344.710683] ? bprm_execve+0x1960/0x1960 [ 1344.711328] __x64_sys_execveat+0xed/0x140 [ 1344.711985] do_syscall_64+0x33/0x40 [ 1344.712549] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.713309] RIP: 0033:0x7fa24edbfb19 [ 1344.713868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.716587] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1344.717720] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1344.718776] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1344.719841] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.720895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1344.721950] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1344.723166] hpet: Lost 1 RTC interrupts 01:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) [ 1344.754169] FAULT_INJECTION: forcing a failure. [ 1344.754169] name failslab, interval 1, probability 0, space 0, times 0 01:27:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) [ 1344.756000] CPU: 0 PID: 24257 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1344.757130] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.758356] Call Trace: [ 1344.758761] dump_stack+0x107/0x167 [ 1344.759315] should_fail.cold+0x5/0xa [ 1344.759901] ? create_object.isra.0+0x3a/0xa20 [ 1344.760591] should_failslab+0x5/0x20 [ 1344.761161] kmem_cache_alloc+0x5b/0x310 [ 1344.761789] create_object.isra.0+0x3a/0xa20 [ 1344.762448] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1344.763219] __kmalloc_track_caller+0x177/0x370 [ 1344.763956] ? __request_module+0x2fe/0x920 [ 1344.764620] ? bprm_execve+0x9a0/0x1960 [ 1344.765208] kstrdup+0x36/0x70 [ 1344.765703] __request_module+0x2fe/0x920 [ 1344.766336] ? free_modprobe_argv+0x90/0x90 [ 1344.766988] ? __lockdep_reset_lock+0x180/0x180 [ 1344.767710] ? find_held_lock+0x2c/0x110 [ 1344.768333] ? bprm_execve+0x8f8/0x1960 [ 1344.768934] ? lock_downgrade+0x6d0/0x6d0 [ 1344.769555] ? elf_core_dump+0x3c50/0x3c50 [ 1344.770195] ? do_raw_read_unlock+0x3b/0x70 [ 1344.770840] ? _raw_read_unlock+0x1a/0x30 [ 1344.771459] ? load_misc_binary+0x605/0xb70 [ 1344.772137] bprm_execve+0x9a0/0x1960 [ 1344.772731] ? open_exec+0x70/0x70 [ 1344.773270] ? copy_string_kernel+0x3b6/0x450 [ 1344.773969] do_execveat_common+0x772/0x8d0 [ 1344.774628] ? bprm_execve+0x1960/0x1960 [ 1344.775273] __x64_sys_execveat+0xed/0x140 [ 1344.775928] do_syscall_64+0x33/0x40 [ 1344.776487] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.777248] RIP: 0033:0x7f1d9af7cb19 [ 1344.777800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.780511] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1344.781645] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1344.782705] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1344.783767] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.784825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1344.785880] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1344.787118] hpet: Lost 1 RTC interrupts 01:27:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 01:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) 01:27:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) 01:27:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) 01:27:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) 01:27:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) [ 1344.922049] FAULT_INJECTION: forcing a failure. [ 1344.922049] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.923237] CPU: 1 PID: 24693 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1344.923870] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.924616] Call Trace: [ 1344.924868] dump_stack+0x107/0x167 [ 1344.925203] should_fail.cold+0x5/0xa [ 1344.925563] ? create_object.isra.0+0x3a/0xa20 [ 1344.925982] should_failslab+0x5/0x20 [ 1344.926332] kmem_cache_alloc+0x5b/0x310 [ 1344.926704] create_object.isra.0+0x3a/0xa20 [ 1344.927105] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1344.927568] kmem_cache_alloc+0x159/0x310 [ 1344.927956] __anon_vma_prepare+0x62/0x500 [ 1344.928341] ? __pte_alloc+0x194/0x330 [ 1344.928695] handle_mm_fault+0x2b2d/0x3500 [ 1344.929084] ? perf_trace_lock+0xac/0x490 [ 1344.929461] ? __lockdep_reset_lock+0x180/0x180 [ 1344.929884] ? __pmd_alloc+0x5e0/0x5e0 [ 1344.930254] __get_user_pages+0x6ec/0x1620 [ 1344.930639] ? follow_page_mask+0x1900/0x1900 [ 1344.931045] ? __lockdep_reset_lock+0x180/0x180 [ 1344.931462] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1344.931901] __get_user_pages_remote+0x1d5/0x870 [ 1344.932328] ? lock_downgrade+0x6d0/0x6d0 [ 1344.932712] get_user_pages_remote+0x63/0x90 [ 1344.933125] get_arg_page+0xba/0x200 [ 1344.933470] ? acct_arg_size+0xe0/0xe0 [ 1344.933825] ? downgrade_write+0x3a0/0x3a0 [ 1344.934211] ? count.constprop.0+0x1b3/0x290 [ 1344.934619] copy_string_kernel+0x1b4/0x450 [ 1344.935012] do_execveat_common+0x525/0x8d0 [ 1344.935494] ? bprm_execve+0x1960/0x1960 [ 1344.935878] __x64_sys_execveat+0xed/0x140 [ 1344.936261] do_syscall_64+0x33/0x40 [ 1344.936599] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.937059] RIP: 0033:0x7fa24edbfb19 [ 1344.937398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.939022] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1344.939708] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1344.940336] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1344.940974] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.941605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1344.942237] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1359.518437] FAULT_INJECTION: forcing a failure. [ 1359.518437] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.520130] CPU: 1 PID: 25156 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1359.520816] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.521631] Call Trace: [ 1359.521905] dump_stack+0x107/0x167 [ 1359.522276] should_fail.cold+0x5/0xa [ 1359.522665] ? call_usermodehelper_setup+0xa2/0x2f0 [ 1359.523174] should_failslab+0x5/0x20 [ 1359.523559] kmem_cache_alloc_trace+0x55/0x320 [ 1359.524160] call_usermodehelper_setup+0xa2/0x2f0 [ 1359.524642] ? copy_regset_to_user+0x170/0x170 [ 1359.525104] ? bprm_execve+0x9a0/0x1960 [ 1359.525502] __request_module+0x3f9/0x920 [ 1359.525926] ? free_modprobe_argv+0x90/0x90 [ 1359.526365] ? __lockdep_reset_lock+0x180/0x180 [ 1359.526843] ? find_held_lock+0x2c/0x110 [ 1359.527258] ? bprm_execve+0x8f8/0x1960 [ 1359.527656] ? lock_downgrade+0x6d0/0x6d0 [ 1359.528084] ? elf_core_dump+0x3c50/0x3c50 [ 1359.528512] ? do_raw_read_unlock+0x3b/0x70 [ 1359.528946] ? _raw_read_unlock+0x1a/0x30 [ 1359.529361] ? load_misc_binary+0x605/0xb70 [ 1359.529809] bprm_execve+0x9a0/0x1960 [ 1359.530370] ? open_exec+0x70/0x70 [ 1359.530766] ? copy_string_kernel+0x3b6/0x450 [ 1359.531231] do_execveat_common+0x772/0x8d0 [ 1359.531667] ? bprm_execve+0x1960/0x1960 [ 1359.532107] __x64_sys_execveat+0xed/0x140 [ 1359.532541] do_syscall_64+0x33/0x40 [ 1359.532918] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.533425] RIP: 0033:0x7f1d9af7cb19 [ 1359.533799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:27:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 01:27:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 01:27:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) 01:27:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 01:27:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 01:27:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 01:27:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 01:27:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) [ 1359.535587] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1359.536484] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1359.537187] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1359.537890] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.538587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1359.539291] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1359.550857] FAULT_INJECTION: forcing a failure. [ 1359.550857] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.552112] CPU: 1 PID: 25164 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1359.552788] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.553602] Call Trace: [ 1359.553866] dump_stack+0x107/0x167 [ 1359.554227] should_fail.cold+0x5/0xa [ 1359.554610] ? __anon_vma_prepare+0x270/0x500 [ 1359.555055] should_failslab+0x5/0x20 [ 1359.555557] kmem_cache_alloc+0x5b/0x310 [ 1359.555973] __anon_vma_prepare+0x270/0x500 [ 1359.556399] ? __pte_alloc+0x194/0x330 [ 1359.556793] handle_mm_fault+0x2b2d/0x3500 [ 1359.557212] ? perf_trace_lock+0xac/0x490 [ 1359.557614] ? __lockdep_reset_lock+0x180/0x180 [ 1359.558070] ? __pmd_alloc+0x5e0/0x5e0 [ 1359.558474] __get_user_pages+0x6ec/0x1620 [ 1359.558892] ? follow_page_mask+0x1900/0x1900 [ 1359.559331] ? __lockdep_reset_lock+0x180/0x180 [ 1359.559790] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1359.560255] __get_user_pages_remote+0x1d5/0x870 [ 1359.560717] ? lock_downgrade+0x6d0/0x6d0 [ 1359.561128] get_user_pages_remote+0x63/0x90 [ 1359.561562] get_arg_page+0xba/0x200 [ 1359.561768] FAULT_INJECTION: forcing a failure. [ 1359.561768] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.561935] ? acct_arg_size+0xe0/0xe0 [ 1359.563916] ? downgrade_write+0x3a0/0x3a0 [ 1359.564330] ? count.constprop.0+0x1b3/0x290 [ 1359.564770] copy_string_kernel+0x1b4/0x450 [ 1359.565199] do_execveat_common+0x525/0x8d0 [ 1359.565621] ? bprm_execve+0x1960/0x1960 [ 1359.566033] __x64_sys_execveat+0xed/0x140 [ 1359.566449] do_syscall_64+0x33/0x40 [ 1359.566814] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.567311] RIP: 0033:0x7fa24edbfb19 [ 1359.567674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.569439] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1359.570179] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1359.570952] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1359.571643] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.572338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1359.573029] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1359.573737] CPU: 0 PID: 25171 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1359.574776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.575983] Call Trace: [ 1359.576387] dump_stack+0x107/0x167 [ 1359.576929] should_fail.cold+0x5/0xa [ 1359.577502] ? prepare_creds+0x25/0x5e0 [ 1359.578092] should_failslab+0x5/0x20 [ 1359.578660] kmem_cache_alloc+0x5b/0x310 [ 1359.579268] prepare_creds+0x25/0x5e0 [ 1359.579849] prepare_exec_creds+0xd/0x260 [ 1359.580459] bprm_execve+0x118/0x1960 [ 1359.581027] ? count.constprop.0+0x1b3/0x290 [ 1359.581681] ? open_exec+0x70/0x70 [ 1359.582208] ? copy_string_kernel+0x3b6/0x450 [ 1359.582886] do_execveat_common+0x772/0x8d0 [ 1359.583522] ? bprm_execve+0x1960/0x1960 [ 1359.584153] __x64_sys_execveat+0xed/0x140 [ 1359.584773] do_syscall_64+0x33/0x40 [ 1359.585332] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.586076] RIP: 0033:0x7f1b403e0b19 [ 1359.586661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.589311] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1359.590434] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1359.591467] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1359.592504] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.593532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1359.594568] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:27:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 01:27:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) 01:27:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 01:27:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) [ 1359.751089] FAULT_INJECTION: forcing a failure. [ 1359.751089] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.752249] CPU: 1 PID: 25720 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1359.752870] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.753617] Call Trace: [ 1359.753871] dump_stack+0x107/0x167 [ 1359.754210] should_fail.cold+0x5/0xa [ 1359.754563] ? create_object.isra.0+0x3a/0xa20 [ 1359.754985] should_failslab+0x5/0x20 [ 1359.755338] kmem_cache_alloc+0x5b/0x310 [ 1359.755721] create_object.isra.0+0x3a/0xa20 [ 1359.756133] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1359.756605] kmem_cache_alloc_trace+0x151/0x320 [ 1359.757040] call_usermodehelper_setup+0xa2/0x2f0 [ 1359.757481] ? copy_regset_to_user+0x170/0x170 [ 1359.757906] ? bprm_execve+0x9a0/0x1960 [ 1359.758268] __request_module+0x3f9/0x920 [ 1359.758786] ? free_modprobe_argv+0x90/0x90 [ 1359.759185] ? __lockdep_reset_lock+0x180/0x180 [ 1359.759620] ? find_held_lock+0x2c/0x110 [ 1359.760010] ? bprm_execve+0x8f8/0x1960 [ 1359.760375] ? lock_downgrade+0x6d0/0x6d0 [ 1359.760754] ? elf_core_dump+0x3c50/0x3c50 [ 1359.761142] ? do_raw_read_unlock+0x3b/0x70 [ 1359.761536] ? _raw_read_unlock+0x1a/0x30 [ 1359.761915] ? load_misc_binary+0x605/0xb70 [ 1359.762324] bprm_execve+0x9a0/0x1960 [ 1359.762691] ? open_exec+0x70/0x70 [ 1359.763021] ? copy_string_kernel+0x3b6/0x450 [ 1359.763443] do_execveat_common+0x772/0x8d0 [ 1359.763849] ? bprm_execve+0x1960/0x1960 [ 1359.764242] __x64_sys_execveat+0xed/0x140 [ 1359.764641] do_syscall_64+0x33/0x40 [ 1359.764983] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.765448] RIP: 0033:0x7f1d9af7cb19 [ 1359.765788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.767419] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1359.768116] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1359.768752] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1359.769394] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.770034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1359.770670] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1359.793942] FAULT_INJECTION: forcing a failure. [ 1359.793942] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.795689] CPU: 0 PID: 25782 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1359.796706] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.797909] Call Trace: [ 1359.798311] dump_stack+0x107/0x167 [ 1359.798858] should_fail.cold+0x5/0xa [ 1359.799428] ? create_object.isra.0+0x3a/0xa20 [ 1359.800117] should_failslab+0x5/0x20 [ 1359.800691] kmem_cache_alloc+0x5b/0x310 [ 1359.801309] create_object.isra.0+0x3a/0xa20 [ 1359.801968] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1359.802727] kmem_cache_alloc+0x159/0x310 [ 1359.803374] __anon_vma_prepare+0x270/0x500 [ 1359.804015] ? __pte_alloc+0x194/0x330 [ 1359.804617] handle_mm_fault+0x2b2d/0x3500 [ 1359.805283] ? perf_trace_lock+0x2bd/0x490 [ 1359.805915] ? __lockdep_reset_lock+0x180/0x180 [ 1359.806604] ? __pmd_alloc+0x5e0/0x5e0 [ 1359.807233] __get_user_pages+0x6ec/0x1620 [ 1359.807897] ? follow_page_mask+0x1900/0x1900 [ 1359.808566] ? __lockdep_reset_lock+0x180/0x180 [ 1359.809252] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1359.809973] __get_user_pages_remote+0x1d5/0x870 [ 1359.810675] ? lock_downgrade+0x6d0/0x6d0 [ 1359.811308] get_user_pages_remote+0x63/0x90 [ 1359.811976] get_arg_page+0xba/0x200 [ 1359.812544] ? acct_arg_size+0xe0/0xe0 [ 1359.813116] ? downgrade_write+0x3a0/0x3a0 [ 1359.813749] ? count.constprop.0+0x1b3/0x290 [ 1359.814406] copy_string_kernel+0x1b4/0x450 [ 1359.815071] do_execveat_common+0x525/0x8d0 [ 1359.815715] ? bprm_execve+0x1960/0x1960 [ 1359.816358] __x64_sys_execveat+0xed/0x140 [ 1359.816992] do_syscall_64+0x33/0x40 [ 1359.817550] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.818299] RIP: 0033:0x7fa24edbfb19 [ 1359.818853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.821506] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1359.822632] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1359.823674] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1359.824715] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.825756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1359.826797] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1359.827994] hpet: Lost 1 RTC interrupts 01:27:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) 01:27:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 01:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 01:27:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 01:27:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f0) 01:27:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) 01:27:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 01:27:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) [ 1374.638395] FAULT_INJECTION: forcing a failure. [ 1374.638395] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1374.639408] CPU: 0 PID: 25907 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1374.639971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1374.640637] Call Trace: [ 1374.640861] dump_stack+0x107/0x167 [ 1374.641164] should_fail.cold+0x5/0xa [ 1374.641493] __alloc_pages_nodemask+0x182/0x600 [ 1374.641881] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1374.642373] ? up_write+0x191/0x550 [ 1374.642682] ? rwlock_bug.part.0+0x90/0x90 [ 1374.643040] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1374.643496] alloc_pages_vma+0xbb/0x410 [ 1374.643830] handle_mm_fault+0x152f/0x3500 [ 1374.644190] ? perf_trace_lock+0x2bd/0x490 [ 1374.644542] ? __lockdep_reset_lock+0x180/0x180 [ 1374.644925] ? __pmd_alloc+0x5e0/0x5e0 [ 1374.645273] __get_user_pages+0x6ec/0x1620 [ 1374.645633] ? follow_page_mask+0x1900/0x1900 [ 1374.646003] ? __lockdep_reset_lock+0x180/0x180 [ 1374.646390] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 1374.646796] __get_user_pages_remote+0x1d5/0x870 [ 1374.647187] ? lock_downgrade+0x6d0/0x6d0 [ 1374.647564] get_user_pages_remote+0x63/0x90 [ 1374.647943] get_arg_page+0xba/0x200 [ 1374.648257] ? acct_arg_size+0xe0/0xe0 [ 1374.648578] ? downgrade_write+0x3a0/0x3a0 [ 1374.648930] ? count.constprop.0+0x1b3/0x290 [ 1374.649295] copy_string_kernel+0x1b4/0x450 [ 1374.649660] do_execveat_common+0x525/0x8d0 [ 1374.650020] ? bprm_execve+0x1960/0x1960 [ 1374.650373] __x64_sys_execveat+0xed/0x140 [ 1374.650723] do_syscall_64+0x33/0x40 [ 1374.651031] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1374.651444] RIP: 0033:0x7fa24edbfb19 [ 1374.651750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1374.653242] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1374.653862] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1374.654440] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1374.655022] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1374.655599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1374.656185] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1374.659287] FAULT_INJECTION: forcing a failure. [ 1374.659287] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.661111] CPU: 1 PID: 25900 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1374.662197] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1374.663551] Call Trace: [ 1374.663985] dump_stack+0x107/0x167 [ 1374.664560] should_fail.cold+0x5/0xa [ 1374.665162] ? create_object.isra.0+0x3a/0xa20 [ 1374.665880] should_failslab+0x5/0x20 [ 1374.666477] kmem_cache_alloc+0x5b/0x310 [ 1374.667121] create_object.isra.0+0x3a/0xa20 [ 1374.667808] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1374.668613] kmem_cache_alloc+0x159/0x310 [ 1374.669268] prepare_creds+0x25/0x5e0 [ 1374.669866] prepare_exec_creds+0xd/0x260 [ 1374.670514] bprm_execve+0x118/0x1960 [ 1374.671121] ? count.constprop.0+0x1b3/0x290 [ 1374.671812] ? open_exec+0x70/0x70 [ 1374.672368] ? copy_string_kernel+0x3b6/0x450 [ 1374.673082] do_execveat_common+0x772/0x8d0 [ 1374.673762] ? bprm_execve+0x1960/0x1960 [ 1374.674417] __x64_sys_execveat+0xed/0x140 [ 1374.675083] do_syscall_64+0x33/0x40 [ 1374.675663] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1374.676468] RIP: 0033:0x7f1b403e0b19 [ 1374.677052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1374.679937] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1374.681127] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1374.682247] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1374.683363] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1374.684491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1374.685606] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:27:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) 01:27:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 01:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) [ 1374.749307] FAULT_INJECTION: forcing a failure. [ 1374.749307] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1374.750564] CPU: 0 PID: 25918 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1374.751127] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1374.751800] Call Trace: [ 1374.752034] dump_stack+0x107/0x167 [ 1374.752338] should_fail.cold+0x5/0xa [ 1374.752665] __alloc_pages_nodemask+0x182/0x600 [ 1374.753049] ? mark_held_locks+0x9e/0xe0 [ 1374.753383] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1374.753882] ? kmem_cache_free+0xa7/0x2d0 [ 1374.754231] alloc_pages_current+0x187/0x280 [ 1374.754597] __get_free_pages+0xc/0xa0 [ 1374.754913] ? kmem_cache_free+0x249/0x2d0 [ 1374.755258] tlb_remove_table+0x3ca/0xcb0 [ 1374.755606] ___pte_free_tlb+0x86/0xb0 [ 1374.755938] free_pgd_range+0x747/0x1380 [ 1374.756298] free_pgtables+0x230/0x2f0 [ 1374.756626] exit_mmap+0x28e/0x4f0 [ 1374.756927] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1374.757381] mmput+0xca/0x340 [ 1374.757646] free_bprm+0x65/0x2e0 [ 1374.757936] do_execveat_common+0x2e1/0x8d0 [ 1374.758294] ? bprm_execve+0x1960/0x1960 [ 1374.758644] __x64_sys_execveat+0xed/0x140 [ 1374.758996] do_syscall_64+0x33/0x40 [ 1374.759308] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1374.759725] RIP: 0033:0x7f1d9af7cb19 [ 1374.760038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1374.761517] RSP: 002b:00007f1d984f2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1374.762137] RAX: ffffffffffffffda RBX: 00007f1d9b08ff60 RCX: 00007f1d9af7cb19 [ 1374.762714] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1374.763295] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1374.763876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1374.764460] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1374.766856] FAULT_INJECTION: forcing a failure. [ 1374.766856] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.767789] CPU: 0 PID: 26230 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1374.768358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1374.769020] Call Trace: [ 1374.769238] dump_stack+0x107/0x167 [ 1374.769535] should_fail.cold+0x5/0xa [ 1374.769853] ? prepare_creds+0x25/0x5e0 [ 1374.770182] should_failslab+0x5/0x20 [ 1374.770493] kmem_cache_alloc+0x5b/0x310 [ 1374.770833] prepare_creds+0x25/0x5e0 [ 1374.771148] prepare_exec_creds+0xd/0x260 [ 1374.771489] bprm_execve+0x118/0x1960 [ 1374.771806] ? count.constprop.0+0x1b3/0x290 [ 1374.772176] ? open_exec+0x70/0x70 [ 1374.772501] ? copy_string_kernel+0x3b6/0x450 [ 1374.772878] do_execveat_common+0x772/0x8d0 [ 1374.773238] ? bprm_execve+0x1960/0x1960 [ 1374.773593] __x64_sys_execveat+0xed/0x140 [ 1374.773941] do_syscall_64+0x33/0x40 [ 1374.774248] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1374.774658] RIP: 0033:0x7fa24edbfb19 [ 1374.774965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1374.776460] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1374.777085] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1374.777660] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1374.778229] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1374.778799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1374.779372] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:27:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 01:27:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) 01:27:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) 01:27:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f0) 01:27:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) 01:27:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) [ 1374.914323] FAULT_INJECTION: forcing a failure. [ 1374.914323] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.915297] CPU: 0 PID: 26616 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1374.915852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1374.916527] Call Trace: [ 1374.916752] dump_stack+0x107/0x167 [ 1374.917051] should_fail.cold+0x5/0xa [ 1374.917367] ? create_object.isra.0+0x3a/0xa20 [ 1374.917747] should_failslab+0x5/0x20 [ 1374.918061] kmem_cache_alloc+0x5b/0x310 [ 1374.918399] create_object.isra.0+0x3a/0xa20 [ 1374.918757] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1374.919176] kmem_cache_alloc+0x159/0x310 [ 1374.919527] prepare_creds+0x25/0x5e0 [ 1374.919845] prepare_exec_creds+0xd/0x260 [ 1374.920193] bprm_execve+0x118/0x1960 [ 1374.920515] ? count.constprop.0+0x1b3/0x290 [ 1374.920878] ? open_exec+0x70/0x70 [ 1374.921170] ? copy_string_kernel+0x3b6/0x450 [ 1374.921547] do_execveat_common+0x772/0x8d0 [ 1374.921904] ? bprm_execve+0x1960/0x1960 [ 1374.922265] __x64_sys_execveat+0xed/0x140 [ 1374.922619] do_syscall_64+0x33/0x40 [ 1374.922932] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1374.923352] RIP: 0033:0x7fa24edbfb19 [ 1374.923659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1374.925152] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1374.925778] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1374.926359] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1374.926935] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1374.927514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1374.928097] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:27:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 01:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) [ 1374.979520] FAULT_INJECTION: forcing a failure. [ 1374.979520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1374.981022] CPU: 1 PID: 26595 Comm: syz-executor.4 Not tainted 5.10.223 #1 [ 1374.981800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1374.982717] Call Trace: [ 1374.983030] dump_stack+0x107/0x167 [ 1374.983442] should_fail.cold+0x5/0xa [ 1374.983882] _copy_to_user+0x2e/0x180 [ 1374.984336] simple_read_from_buffer+0xcc/0x160 [ 1374.984863] proc_fail_nth_read+0x198/0x230 [ 1374.985349] ? proc_sessionid_read+0x230/0x230 [ 1374.985869] ? security_file_permission+0xb1/0xe0 [ 1374.986426] ? proc_sessionid_read+0x230/0x230 [ 1374.986933] vfs_read+0x228/0x620 [ 1374.987340] ksys_read+0x12d/0x260 [ 1374.987743] ? vfs_write+0xb10/0xb10 [ 1374.988175] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1374.988755] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1374.989341] do_syscall_64+0x33/0x40 [ 1374.989761] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1374.990324] RIP: 0033:0x7f1d9af2f69c [ 1374.990743] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1374.992847] RSP: 002b:00007f1d984f2170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1374.993689] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f1d9af2f69c [ 1374.994468] RDX: 000000000000000f RSI: 00007f1d984f21e0 RDI: 0000000000000004 [ 1374.995253] RBP: 00007f1d984f21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1374.996054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1374.996833] R13: 00007ffcaeabdd6f R14: 00007f1d984f2300 R15: 0000000000022000 [ 1375.027503] FAULT_INJECTION: forcing a failure. [ 1375.027503] name failslab, interval 1, probability 0, space 0, times 0 [ 1375.028444] CPU: 0 PID: 27028 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1375.028999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1375.029657] Call Trace: [ 1375.029882] dump_stack+0x107/0x167 [ 1375.030185] should_fail.cold+0x5/0xa [ 1375.030498] ? security_prepare_creds+0x112/0x190 [ 1375.030895] should_failslab+0x5/0x20 [ 1375.031207] __kmalloc+0x72/0x390 [ 1375.031498] security_prepare_creds+0x112/0x190 [ 1375.031880] prepare_creds+0x452/0x5e0 [ 1375.032202] prepare_exec_creds+0xd/0x260 [ 1375.032541] bprm_execve+0x118/0x1960 [ 1375.032855] ? count.constprop.0+0x1b3/0x290 [ 1375.033210] ? open_exec+0x70/0x70 [ 1375.033502] ? copy_string_kernel+0x3b6/0x450 [ 1375.033874] do_execveat_common+0x772/0x8d0 [ 1375.034233] ? bprm_execve+0x1960/0x1960 [ 1375.034575] __x64_sys_execveat+0xed/0x140 [ 1375.034920] do_syscall_64+0x33/0x40 [ 1375.035228] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1375.035641] RIP: 0033:0x7f1b403e0b19 [ 1375.035952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1375.037421] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1375.038060] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1375.038626] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1375.039203] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1375.039769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1375.040350] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:27:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 01:27:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 01:27:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) 01:27:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 01:27:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) [ 1375.122640] FAULT_INJECTION: forcing a failure. [ 1375.122640] name failslab, interval 1, probability 0, space 0, times 0 [ 1375.124015] CPU: 1 PID: 27155 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1375.124783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1375.125960] Call Trace: [ 1375.126356] dump_stack+0x107/0x167 [ 1375.126888] should_fail.cold+0x5/0xa [ 1375.127444] ? create_object.isra.0+0x3a/0xa20 [ 1375.128099] should_failslab+0x5/0x20 [ 1375.128648] kmem_cache_alloc+0x5b/0x310 [ 1375.129246] create_object.isra.0+0x3a/0xa20 [ 1375.129894] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1375.130648] kmem_cache_alloc+0x159/0x310 [ 1375.131273] prepare_creds+0x25/0x5e0 [ 1375.131801] prepare_exec_creds+0xd/0x260 [ 1375.132282] bprm_execve+0x118/0x1960 [ 1375.132718] ? count.constprop.0+0x1b3/0x290 [ 1375.133223] ? open_exec+0x70/0x70 [ 1375.133615] ? copy_string_kernel+0x3b6/0x450 [ 1375.134128] do_execveat_common+0x772/0x8d0 [ 1375.134612] ? bprm_execve+0x1960/0x1960 [ 1375.135090] __x64_sys_execveat+0xed/0x140 [ 1375.135581] do_syscall_64+0x33/0x40 [ 1375.136011] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1375.136793] RIP: 0033:0x7fa24edbfb19 [ 1375.137324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1375.140030] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1375.141172] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1375.142236] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1375.143268] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1375.144319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1375.145320] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:28:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:28:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 01:28:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 01:28:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002) 01:28:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 01:28:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 01:28:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) 01:28:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) [ 1388.781762] FAULT_INJECTION: forcing a failure. [ 1388.781762] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.783369] CPU: 0 PID: 27573 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1388.784270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1388.785339] Call Trace: [ 1388.785699] dump_stack+0x107/0x167 [ 1388.786179] should_fail.cold+0x5/0xa [ 1388.786684] ? create_object.isra.0+0x3a/0xa20 [ 1388.787376] should_failslab+0x5/0x20 [ 1388.787879] kmem_cache_alloc+0x5b/0x310 [ 1388.788435] create_object.isra.0+0x3a/0xa20 [ 1388.789015] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1388.789688] __kmalloc+0x16e/0x390 [ 1388.790173] security_prepare_creds+0x112/0x190 [ 1388.790796] prepare_creds+0x452/0x5e0 [ 1388.791314] prepare_exec_creds+0xd/0x260 [ 1388.791863] bprm_execve+0x118/0x1960 [ 1388.792430] ? count.constprop.0+0x1b3/0x290 [ 1388.793062] ? open_exec+0x70/0x70 [ 1388.793539] ? copy_string_kernel+0x3b6/0x450 [ 1388.794142] do_execveat_common+0x772/0x8d0 [ 1388.794713] ? bprm_execve+0x1960/0x1960 [ 1388.795278] __x64_sys_execveat+0xed/0x140 [ 1388.795844] do_syscall_64+0x33/0x40 [ 1388.796339] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1388.797082] RIP: 0033:0x7fa24edbfb19 [ 1388.797570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1388.799912] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1388.800317] FAULT_INJECTION: forcing a failure. [ 1388.800317] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.800935] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1388.800949] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1388.800965] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1388.804641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1388.805624] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1388.806761] CPU: 1 PID: 27586 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1388.806773] hpet: Lost 1 RTC interrupts [ 1388.807687] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1388.808371] Call Trace: [ 1388.808598] dump_stack+0x107/0x167 [ 1388.808903] should_fail.cold+0x5/0xa [ 1388.809222] ? create_object.isra.0+0x3a/0xa20 [ 1388.809597] should_failslab+0x5/0x20 [ 1388.809911] kmem_cache_alloc+0x5b/0x310 [ 1388.810244] create_object.isra.0+0x3a/0xa20 [ 1388.810597] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1388.811023] __kmalloc+0x16e/0x390 [ 1388.811319] security_prepare_creds+0x112/0x190 [ 1388.811706] prepare_creds+0x452/0x5e0 [ 1388.812030] prepare_exec_creds+0xd/0x260 [ 1388.812386] bprm_execve+0x118/0x1960 [ 1388.812703] ? count.constprop.0+0x1b3/0x290 [ 1388.813065] ? open_exec+0x70/0x70 [ 1388.813356] ? copy_string_kernel+0x3b6/0x450 [ 1388.813723] do_execveat_common+0x772/0x8d0 [ 1388.814084] ? bprm_execve+0x1960/0x1960 [ 1388.814426] __x64_sys_execveat+0xed/0x140 [ 1388.814786] do_syscall_64+0x33/0x40 [ 1388.815093] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1388.815509] RIP: 0033:0x7f1b403e0b19 [ 1388.815825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1388.817398] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1388.818025] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1388.818603] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1388.819188] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1388.819777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1388.820371] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:28:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 01:28:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 01:28:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a) 01:28:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 01:28:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48000000) 01:28:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 01:28:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 01:28:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 01:28:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) [ 1403.090158] FAULT_INJECTION: forcing a failure. [ 1403.090158] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.092121] CPU: 1 PID: 28204 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1403.093300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1403.094740] Call Trace: [ 1403.095199] dump_stack+0x107/0x167 [ 1403.095844] should_fail.cold+0x5/0xa [ 1403.096542] ? __alloc_file+0x21/0x320 [ 1403.097236] should_failslab+0x5/0x20 [ 1403.097903] kmem_cache_alloc+0x5b/0x310 [ 1403.098619] __alloc_file+0x21/0x320 [ 1403.099289] alloc_empty_file+0x6d/0x170 [ 1403.099996] path_openat+0xe6/0x2770 [ 1403.100656] ? lock_chain_count+0x20/0x20 [ 1403.101486] ? stack_trace_consume_entry+0x160/0x160 [ 1403.102345] ? path_lookupat+0x860/0x860 [ 1403.103109] ? kasan_save_stack+0x32/0x40 [ 1403.103817] ? kasan_save_stack+0x1b/0x40 [ 1403.104539] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1403.105399] ? security_prepare_creds+0x112/0x190 [ 1403.106263] ? prepare_creds+0x452/0x5e0 [ 1403.106957] ? prepare_exec_creds+0xd/0x260 [ 1403.107689] do_filp_open+0x190/0x3e0 [ 1403.108372] ? may_open_dev+0xf0/0xf0 [ 1403.109035] ? perf_trace_lock+0xac/0x490 [ 1403.109756] ? perf_trace_lock+0xac/0x490 [ 1403.110487] ? __lockdep_reset_lock+0x180/0x180 [ 1403.111281] ? find_held_lock+0x2c/0x110 [ 1403.111977] do_open_execat+0x116/0x750 [ 1403.112681] ? bprm_execve+0x49d/0x1960 [ 1403.113360] ? __do_sys_uselib+0x680/0x680 [ 1403.114118] ? do_raw_spin_lock+0x121/0x260 [ 1403.114852] ? rwlock_bug.part.0+0x90/0x90 [ 1403.115619] bprm_execve+0x4dc/0x1960 [ 1403.116273] ? count.constprop.0+0x1b3/0x290 [ 1403.117099] ? open_exec+0x70/0x70 [ 1403.117728] ? copy_string_kernel+0x3b6/0x450 [ 1403.118501] do_execveat_common+0x772/0x8d0 [ 1403.119235] ? bprm_execve+0x1960/0x1960 [ 1403.119973] __x64_sys_execveat+0xed/0x140 [ 1403.120706] do_syscall_64+0x33/0x40 [ 1403.121338] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1403.122223] RIP: 0033:0x7f1b403e0b19 [ 1403.122878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1403.126030] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1403.127367] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1403.128565] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1403.129749] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1403.131003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1403.132309] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1403.146146] FAULT_INJECTION: forcing a failure. [ 1403.146146] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.148239] CPU: 1 PID: 28445 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1403.149390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1403.150763] Call Trace: [ 1403.151223] dump_stack+0x107/0x167 [ 1403.151838] should_fail.cold+0x5/0xa [ 1403.152510] ? __alloc_file+0x21/0x320 [ 1403.153170] should_failslab+0x5/0x20 [ 1403.153810] kmem_cache_alloc+0x5b/0x310 [ 1403.154538] __alloc_file+0x21/0x320 [ 1403.155167] alloc_empty_file+0x6d/0x170 [ 1403.155849] path_openat+0xe6/0x2770 [ 1403.156484] ? lock_chain_count+0x20/0x20 [ 1403.157222] ? stack_trace_consume_entry+0x160/0x160 [ 1403.158069] ? path_lookupat+0x860/0x860 [ 1403.158759] ? kasan_save_stack+0x32/0x40 [ 1403.159451] ? kasan_save_stack+0x1b/0x40 [ 1403.160194] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1403.161044] ? security_prepare_creds+0x112/0x190 [ 1403.161865] ? prepare_creds+0x452/0x5e0 [ 1403.162584] ? prepare_exec_creds+0xd/0x260 [ 1403.163414] do_filp_open+0x190/0x3e0 [ 1403.164072] ? may_open_dev+0xf0/0xf0 [ 1403.164765] ? perf_trace_lock+0xac/0x490 [ 1403.165455] ? perf_trace_lock+0xac/0x490 [ 1403.166155] ? __lockdep_reset_lock+0x180/0x180 [ 1403.166935] ? find_held_lock+0x2c/0x110 [ 1403.167639] do_open_execat+0x116/0x750 [ 1403.168305] ? bprm_execve+0x49d/0x1960 [ 1403.168991] ? __do_sys_uselib+0x680/0x680 [ 1403.169698] ? do_raw_spin_lock+0x121/0x260 [ 1403.170426] ? rwlock_bug.part.0+0x90/0x90 [ 1403.171171] bprm_execve+0x4dc/0x1960 [ 1403.171811] ? count.constprop.0+0x1b3/0x290 [ 1403.172593] ? open_exec+0x70/0x70 [ 1403.173191] ? copy_string_kernel+0x3b6/0x450 [ 1403.173947] do_execveat_common+0x772/0x8d0 [ 1403.174696] ? bprm_execve+0x1960/0x1960 [ 1403.175429] __x64_sys_execveat+0xed/0x140 [ 1403.176166] do_syscall_64+0x33/0x40 [ 1403.176809] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1403.177655] RIP: 0033:0x7fa24edbfb19 [ 1403.178275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1403.181377] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1403.182646] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1403.183869] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1403.185263] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1403.186493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1403.187744] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:28:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000) 01:28:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 01:28:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 01:28:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c000000) 01:28:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 01:28:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 01:28:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 01:28:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) [ 1403.472343] FAULT_INJECTION: forcing a failure. [ 1403.472343] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.474088] CPU: 1 PID: 29232 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1403.475104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1403.476655] Call Trace: [ 1403.477070] dump_stack+0x107/0x167 [ 1403.477601] should_fail.cold+0x5/0xa [ 1403.478159] ? create_object.isra.0+0x3a/0xa20 [ 1403.478824] should_failslab+0x5/0x20 [ 1403.479377] kmem_cache_alloc+0x5b/0x310 [ 1403.479979] create_object.isra.0+0x3a/0xa20 [ 1403.480630] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1403.481378] kmem_cache_alloc+0x159/0x310 [ 1403.481987] __alloc_file+0x21/0x320 [ 1403.482533] alloc_empty_file+0x6d/0x170 [ 1403.483122] path_openat+0xe6/0x2770 [ 1403.483678] ? lock_chain_count+0x20/0x20 [ 1403.484300] ? stack_trace_consume_entry+0x160/0x160 [ 1403.485038] ? path_lookupat+0x860/0x860 [ 1403.485646] ? kasan_save_stack+0x32/0x40 [ 1403.486253] ? kasan_save_stack+0x1b/0x40 [ 1403.486857] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1403.487598] ? security_prepare_creds+0x112/0x190 [ 1403.488324] ? prepare_creds+0x452/0x5e0 [ 1403.488913] ? prepare_exec_creds+0xd/0x260 [ 1403.489543] do_filp_open+0x190/0x3e0 [ 1403.490100] ? may_open_dev+0xf0/0xf0 [ 1403.490671] ? perf_trace_lock+0xac/0x490 [ 1403.491276] ? perf_trace_lock+0xac/0x490 [ 1403.491886] ? __lockdep_reset_lock+0x180/0x180 [ 1403.492665] ? find_held_lock+0x2c/0x110 [ 1403.493262] do_open_execat+0x116/0x750 [ 1403.493843] ? bprm_execve+0x49d/0x1960 [ 1403.494423] ? __do_sys_uselib+0x680/0x680 [ 1403.495038] ? do_raw_spin_lock+0x121/0x260 [ 1403.495670] ? rwlock_bug.part.0+0x90/0x90 [ 1403.496312] bprm_execve+0x4dc/0x1960 [ 1403.496876] ? count.constprop.0+0x1b3/0x290 [ 1403.497521] ? open_exec+0x70/0x70 [ 1403.498037] ? copy_string_kernel+0x3b6/0x450 [ 1403.498707] do_execveat_common+0x772/0x8d0 [ 1403.499343] ? bprm_execve+0x1960/0x1960 [ 1403.499960] __x64_sys_execveat+0xed/0x140 [ 1403.500591] do_syscall_64+0x33/0x40 [ 1403.501135] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1403.501883] RIP: 0033:0x7fa24edbfb19 [ 1403.502430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1403.505093] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1403.506193] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1403.507220] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1403.508381] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1403.509415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1403.510446] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:28:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) [ 1403.526819] FAULT_INJECTION: forcing a failure. [ 1403.526819] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.528152] CPU: 0 PID: 29282 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1403.528948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1403.529876] Call Trace: [ 1403.530177] dump_stack+0x107/0x167 [ 1403.530601] should_fail.cold+0x5/0xa [ 1403.531041] ? create_object.isra.0+0x3a/0xa20 [ 1403.531562] should_failslab+0x5/0x20 [ 1403.531992] kmem_cache_alloc+0x5b/0x310 [ 1403.532480] create_object.isra.0+0x3a/0xa20 [ 1403.532976] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1403.533554] kmem_cache_alloc+0x159/0x310 [ 1403.534034] __alloc_file+0x21/0x320 [ 1403.534458] alloc_empty_file+0x6d/0x170 [ 1403.534924] path_openat+0xe6/0x2770 [ 1403.535370] ? lock_chain_count+0x20/0x20 [ 1403.535856] ? stack_trace_consume_entry+0x160/0x160 [ 1403.536453] ? path_lookupat+0x860/0x860 [ 1403.536924] ? kasan_save_stack+0x32/0x40 [ 1403.537380] ? kasan_save_stack+0x1b/0x40 [ 1403.537842] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1403.538440] ? security_prepare_creds+0x112/0x190 [ 1403.539007] ? prepare_creds+0x452/0x5e0 [ 1403.539500] ? prepare_exec_creds+0xd/0x260 [ 1403.539991] do_filp_open+0x190/0x3e0 [ 1403.540453] ? may_open_dev+0xf0/0xf0 [ 1403.540898] ? perf_trace_lock+0xac/0x490 [ 1403.541366] ? perf_trace_lock+0xac/0x490 [ 1403.541854] ? __lockdep_reset_lock+0x180/0x180 [ 1403.542373] ? find_held_lock+0x2c/0x110 [ 1403.542827] do_open_execat+0x116/0x750 [ 1403.543275] ? bprm_execve+0x49d/0x1960 [ 1403.543718] ? __do_sys_uselib+0x680/0x680 [ 1403.544216] ? do_raw_spin_lock+0x121/0x260 [ 1403.544718] ? rwlock_bug.part.0+0x90/0x90 [ 1403.545198] bprm_execve+0x4dc/0x1960 [ 1403.545620] ? count.constprop.0+0x1b3/0x290 [ 1403.546118] ? open_exec+0x70/0x70 [ 1403.546509] ? copy_string_kernel+0x3b6/0x450 [ 1403.547014] do_execveat_common+0x772/0x8d0 [ 1403.547497] ? bprm_execve+0x1960/0x1960 [ 1403.547968] __x64_sys_execveat+0xed/0x140 [ 1403.548470] do_syscall_64+0x33/0x40 [ 1403.548891] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1403.549459] RIP: 0033:0x7f1b403e0b19 [ 1403.549886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1403.551910] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1403.552754] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1403.553547] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1403.554323] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1403.555118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1403.555919] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1403.556818] hpet: Lost 1 RTC interrupts 01:28:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 01:28:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xaf2) 01:28:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 01:28:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 01:28:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) 01:28:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 01:28:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68000000) 01:28:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) [ 1418.285239] FAULT_INJECTION: forcing a failure. [ 1418.285239] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.287135] CPU: 1 PID: 29560 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1418.288255] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1418.289478] Call Trace: [ 1418.289876] dump_stack+0x107/0x167 [ 1418.290420] should_fail.cold+0x5/0xa [ 1418.290989] ? security_file_alloc+0x34/0x170 [ 1418.291660] should_failslab+0x5/0x20 [ 1418.292225] kmem_cache_alloc+0x5b/0x310 [ 1418.292863] security_file_alloc+0x34/0x170 [ 1418.293511] __alloc_file+0xb7/0x320 [ 1418.294061] alloc_empty_file+0x6d/0x170 [ 1418.294668] path_openat+0xe6/0x2770 [ 1418.295223] ? lock_chain_count+0x20/0x20 [ 1418.295843] ? stack_trace_consume_entry+0x160/0x160 [ 1418.296602] ? path_lookupat+0x860/0x860 [ 1418.297213] ? kasan_save_stack+0x32/0x40 [ 1418.297834] ? kasan_save_stack+0x1b/0x40 [ 1418.298449] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1418.299192] ? security_prepare_creds+0x112/0x190 [ 1418.299901] ? prepare_creds+0x452/0x5e0 [ 1418.300508] ? prepare_exec_creds+0xd/0x260 [ 1418.301151] do_filp_open+0x190/0x3e0 [ 1418.301712] ? may_open_dev+0xf0/0xf0 [ 1418.302289] ? perf_trace_lock+0xac/0x490 [ 1418.302901] ? perf_trace_lock+0xac/0x490 [ 1418.303618] ? __lockdep_reset_lock+0x180/0x180 [ 1418.304329] ? find_held_lock+0x2c/0x110 [ 1418.304935] do_open_execat+0x116/0x750 [ 1418.305523] ? bprm_execve+0x49d/0x1960 [ 1418.306117] ? __do_sys_uselib+0x680/0x680 [ 1418.306737] ? do_raw_spin_lock+0x121/0x260 [ 1418.307375] ? rwlock_bug.part.0+0x90/0x90 [ 1418.308011] bprm_execve+0x4dc/0x1960 [ 1418.308593] ? count.constprop.0+0x1b3/0x290 [ 1418.309243] ? open_exec+0x70/0x70 [ 1418.309769] ? copy_string_kernel+0x3b6/0x450 [ 1418.310446] do_execveat_common+0x772/0x8d0 [ 1418.311079] ? bprm_execve+0x1960/0x1960 [ 1418.311703] __x64_sys_execveat+0xed/0x140 [ 1418.312340] do_syscall_64+0x33/0x40 [ 1418.312898] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1418.313649] RIP: 0033:0x7f1b403e0b19 [ 1418.314199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1418.316880] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1418.317987] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1418.319091] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1418.320140] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1418.321199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1418.322242] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1418.337285] FAULT_INJECTION: forcing a failure. [ 1418.337285] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.339137] CPU: 0 PID: 29568 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1418.340157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1418.341375] Call Trace: [ 1418.341782] dump_stack+0x107/0x167 [ 1418.342337] should_fail.cold+0x5/0xa [ 1418.342914] ? security_file_alloc+0x34/0x170 [ 1418.343592] should_failslab+0x5/0x20 [ 1418.344160] kmem_cache_alloc+0x5b/0x310 [ 1418.344795] security_file_alloc+0x34/0x170 [ 1418.345446] __alloc_file+0xb7/0x320 [ 1418.346011] alloc_empty_file+0x6d/0x170 [ 1418.346626] path_openat+0xe6/0x2770 [ 1418.347200] ? lock_chain_count+0x20/0x20 [ 1418.347828] ? stack_trace_consume_entry+0x160/0x160 [ 1418.348590] ? path_lookupat+0x860/0x860 [ 1418.349218] ? kasan_save_stack+0x32/0x40 [ 1418.349841] ? kasan_save_stack+0x1b/0x40 [ 1418.350487] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1418.351234] ? security_prepare_creds+0x112/0x190 [ 1418.351946] ? prepare_creds+0x452/0x5e0 [ 1418.352553] ? prepare_exec_creds+0xd/0x260 [ 1418.353208] do_filp_open+0x190/0x3e0 [ 1418.353773] ? may_open_dev+0xf0/0xf0 [ 1418.354343] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1418.355096] ? perf_trace_lock+0x2bd/0x490 [ 1418.355748] ? __lockdep_reset_lock+0x180/0x180 [ 1418.356492] ? find_held_lock+0x2c/0x110 [ 1418.357163] do_open_execat+0x116/0x750 [ 1418.357899] ? bprm_execve+0x49d/0x1960 [ 1418.358510] ? __do_sys_uselib+0x680/0x680 [ 1418.359139] ? do_raw_spin_lock+0x121/0x260 [ 1418.359780] ? rwlock_bug.part.0+0x90/0x90 [ 1418.360450] bprm_execve+0x4dc/0x1960 [ 1418.361031] ? count.constprop.0+0x1b3/0x290 [ 1418.361689] ? open_exec+0x70/0x70 [ 1418.362223] ? copy_string_kernel+0x3b6/0x450 [ 1418.362909] do_execveat_common+0x772/0x8d0 [ 1418.363558] ? bprm_execve+0x1960/0x1960 [ 1418.364197] __x64_sys_execveat+0xed/0x140 [ 1418.364856] do_syscall_64+0x33/0x40 [ 1418.365410] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1418.366165] RIP: 0033:0x7fa24edbfb19 [ 1418.366722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1418.369400] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1418.370517] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1418.371560] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1418.372609] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1418.373648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1418.374693] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1418.375897] hpet: Lost 1 RTC interrupts 01:28:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 01:28:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) [ 1418.539979] FAULT_INJECTION: forcing a failure. [ 1418.539979] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.541872] CPU: 0 PID: 30175 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1418.542881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1418.544083] Call Trace: [ 1418.544490] dump_stack+0x107/0x167 [ 1418.545029] should_fail.cold+0x5/0xa [ 1418.545597] ? create_object.isra.0+0x3a/0xa20 [ 1418.546271] should_failslab+0x5/0x20 [ 1418.546831] kmem_cache_alloc+0x5b/0x310 [ 1418.547427] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1418.548235] create_object.isra.0+0x3a/0xa20 [ 1418.548889] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1418.549636] kmem_cache_alloc+0x159/0x310 [ 1418.550254] security_file_alloc+0x34/0x170 [ 1418.550891] __alloc_file+0xb7/0x320 01:28:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) [ 1418.551453] alloc_empty_file+0x6d/0x170 [ 1418.552155] path_openat+0xe6/0x2770 [ 1418.552721] ? lock_chain_count+0x20/0x20 [ 1418.553336] ? stack_trace_consume_entry+0x160/0x160 [ 1418.554101] ? path_lookupat+0x860/0x860 [ 1418.554705] ? kasan_save_stack+0x32/0x40 [ 1418.555315] ? kasan_save_stack+0x1b/0x40 [ 1418.555923] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1418.556668] ? security_prepare_creds+0x112/0x190 [ 1418.557372] ? prepare_creds+0x452/0x5e0 [ 1418.557961] ? prepare_exec_creds+0xd/0x260 [ 1418.558596] do_filp_open+0x190/0x3e0 [ 1418.559152] ? may_open_dev+0xf0/0xf0 [ 1418.559729] ? perf_trace_lock+0xac/0x490 [ 1418.560350] ? perf_trace_lock+0xac/0x490 [ 1418.560970] ? __lockdep_reset_lock+0x180/0x180 [ 1418.561665] ? find_held_lock+0x2c/0x110 [ 1418.562264] do_open_execat+0x116/0x750 [ 1418.562843] ? bprm_execve+0x49d/0x1960 [ 1418.563425] ? __do_sys_uselib+0x680/0x680 [ 1418.564041] ? do_raw_spin_lock+0x121/0x260 [ 1418.564681] ? rwlock_bug.part.0+0x90/0x90 [ 1418.565311] bprm_execve+0x4dc/0x1960 [ 1418.565876] ? count.constprop.0+0x1b3/0x290 [ 1418.566534] ? open_exec+0x70/0x70 [ 1418.567051] ? copy_string_kernel+0x3b6/0x450 [ 1418.567717] do_execveat_common+0x772/0x8d0 [ 1418.568358] ? bprm_execve+0x1960/0x1960 [ 1418.568970] __x64_sys_execveat+0xed/0x140 [ 1418.569591] do_syscall_64+0x33/0x40 [ 1418.570135] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1418.570879] RIP: 0033:0x7f1b403e0b19 [ 1418.571432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1418.574077] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1418.575182] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1418.576221] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1418.577251] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1418.578279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1418.579314] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1418.580536] hpet: Lost 1 RTC interrupts 01:28:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 01:28:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 01:28:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 01:28:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) 01:28:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c000000) [ 1418.667219] FAULT_INJECTION: forcing a failure. [ 1418.667219] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.669159] CPU: 1 PID: 30261 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1418.670182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1418.671391] Call Trace: [ 1418.671796] dump_stack+0x107/0x167 [ 1418.672350] should_fail.cold+0x5/0xa [ 1418.672924] ? create_object.isra.0+0x3a/0xa20 [ 1418.673597] should_failslab+0x5/0x20 [ 1418.674164] kmem_cache_alloc+0x5b/0x310 [ 1418.674763] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1418.675575] create_object.isra.0+0x3a/0xa20 [ 1418.676221] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1418.676985] kmem_cache_alloc+0x159/0x310 [ 1418.677616] security_file_alloc+0x34/0x170 [ 1418.678258] __alloc_file+0xb7/0x320 [ 1418.678917] alloc_empty_file+0x6d/0x170 [ 1418.679523] path_openat+0xe6/0x2770 [ 1418.680074] ? lock_chain_count+0x20/0x20 [ 1418.680709] ? stack_trace_consume_entry+0x160/0x160 [ 1418.681457] ? path_lookupat+0x860/0x860 [ 1418.682069] ? kasan_save_stack+0x32/0x40 [ 1418.682679] ? kasan_save_stack+0x1b/0x40 [ 1418.683278] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1418.684025] ? security_prepare_creds+0x112/0x190 [ 1418.684746] ? prepare_creds+0x452/0x5e0 [ 1418.685337] ? prepare_exec_creds+0xd/0x260 [ 1418.685979] do_filp_open+0x190/0x3e0 [ 1418.686537] ? may_open_dev+0xf0/0xf0 [ 1418.687115] ? perf_trace_lock+0xac/0x490 [ 1418.687723] ? perf_trace_lock+0xac/0x490 [ 1418.688352] ? __lockdep_reset_lock+0x180/0x180 [ 1418.689050] ? find_held_lock+0x2c/0x110 [ 1418.689646] do_open_execat+0x116/0x750 [ 1418.690231] ? bprm_execve+0x49d/0x1960 [ 1418.690813] ? __do_sys_uselib+0x680/0x680 [ 1418.691440] ? do_raw_spin_lock+0x121/0x260 [ 1418.692084] ? rwlock_bug.part.0+0x90/0x90 [ 1418.692736] bprm_execve+0x4dc/0x1960 [ 1418.693308] ? count.constprop.0+0x1b3/0x290 [ 1418.693962] ? open_exec+0x70/0x70 [ 1418.694608] ? copy_string_kernel+0x3b6/0x450 [ 1418.695277] do_execveat_common+0x772/0x8d0 [ 1418.695912] ? bprm_execve+0x1960/0x1960 [ 1418.696547] __x64_sys_execveat+0xed/0x140 [ 1418.697173] do_syscall_64+0x33/0x40 [ 1418.697728] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1418.698481] RIP: 0033:0x7fa24edbfb19 [ 1418.699029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1418.701707] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1418.702823] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1418.703868] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1418.704924] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1418.705965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1418.707010] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:28:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) 01:28:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 01:28:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 01:28:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 01:28:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) 01:28:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xaf2) 01:28:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 01:28:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) [ 1435.011437] FAULT_INJECTION: forcing a failure. [ 1435.011437] name failslab, interval 1, probability 0, space 0, times 0 [ 1435.013615] CPU: 0 PID: 30819 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1435.014844] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1435.016305] Call Trace: [ 1435.016796] dump_stack+0x107/0x167 [ 1435.017463] should_fail.cold+0x5/0xa [ 1435.018165] ? jbd2__journal_start+0x190/0x7e0 [ 1435.019000] should_failslab+0x5/0x20 [ 1435.019702] kmem_cache_alloc+0x5b/0x310 [ 1435.020453] jbd2__journal_start+0x190/0x7e0 [ 1435.021079] FAULT_INJECTION: forcing a failure. [ 1435.021079] name failslab, interval 1, probability 0, space 0, times 0 [ 1435.021292] __ext4_journal_start_sb+0x214/0x390 [ 1435.023843] ext4_dirty_inode+0xbc/0x130 [ 1435.024605] ? ext4_setattr+0x2160/0x2160 [ 1435.025294] __mark_inode_dirty+0x492/0xd40 [ 1435.025931] touch_atime+0x5ea/0x6e0 [ 1435.026493] ? atime_needs_update+0x600/0x600 [ 1435.027175] ? mark_page_accessed+0x125/0x10d0 [ 1435.027867] generic_file_buffered_read+0x191a/0x2920 [ 1435.028690] ? pagecache_get_page+0xc80/0xc80 [ 1435.029401] generic_file_read_iter+0x33f/0x490 [ 1435.030113] ext4_file_read_iter+0x184/0x4c0 [ 1435.030776] __kernel_read+0x593/0xb30 [ 1435.031364] ? do_sendfile+0x11e0/0x11e0 [ 1435.031998] ? fsnotify_perm.part.0+0x22d/0x620 [ 1435.032720] ? security_file_permission+0xb1/0xe0 [ 1435.033463] kernel_read+0x52/0x70 [ 1435.034008] bprm_execve+0x767/0x1960 [ 1435.034599] ? open_exec+0x70/0x70 [ 1435.035135] ? copy_string_kernel+0x3b6/0x450 [ 1435.035822] do_execveat_common+0x772/0x8d0 [ 1435.036480] ? bprm_execve+0x1960/0x1960 [ 1435.037124] __x64_sys_execveat+0xed/0x140 [ 1435.037769] do_syscall_64+0x33/0x40 [ 1435.038331] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1435.039085] RIP: 0033:0x7fa24edbfb19 [ 1435.039640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1435.042338] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1435.043456] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1435.044506] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1435.045543] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1435.046582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1435.047622] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1435.048728] CPU: 1 PID: 30821 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1435.048824] hpet: Lost 1 RTC interrupts [ 1435.049794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1435.051588] Call Trace: [ 1435.051985] dump_stack+0x107/0x167 [ 1435.052545] should_fail.cold+0x5/0xa [ 1435.053185] ? jbd2__journal_start+0x190/0x7e0 [ 1435.053863] should_failslab+0x5/0x20 [ 1435.054417] kmem_cache_alloc+0x5b/0x310 [ 1435.055033] jbd2__journal_start+0x190/0x7e0 [ 1435.055699] __ext4_journal_start_sb+0x214/0x390 [ 1435.056401] ext4_dirty_inode+0xbc/0x130 [ 1435.057013] ? ext4_setattr+0x2160/0x2160 [ 1435.057621] __mark_inode_dirty+0x492/0xd40 [ 1435.058261] touch_atime+0x5ea/0x6e0 [ 1435.058811] ? atime_needs_update+0x600/0x600 [ 1435.059494] ? mark_page_accessed+0x125/0x10d0 [ 1435.060169] generic_file_buffered_read+0x191a/0x2920 [ 1435.061089] ? pagecache_get_page+0xc80/0xc80 [ 1435.061862] ? __lock_acquire+0xbb1/0x5b00 [ 1435.062491] generic_file_read_iter+0x33f/0x490 [ 1435.063202] ext4_file_read_iter+0x184/0x4c0 [ 1435.063866] __kernel_read+0x593/0xb30 [ 1435.064448] ? do_sendfile+0x11e0/0x11e0 [ 1435.065070] ? fsnotify_perm.part.0+0x22d/0x620 [ 1435.065767] ? security_file_permission+0xb1/0xe0 [ 1435.066482] kernel_read+0x52/0x70 [ 1435.067021] bprm_execve+0x767/0x1960 [ 1435.067604] ? open_exec+0x70/0x70 [ 1435.068129] ? copy_string_kernel+0x3b6/0x450 [ 1435.068901] do_execveat_common+0x772/0x8d0 [ 1435.069551] ? bprm_execve+0x1960/0x1960 [ 1435.070177] __x64_sys_execveat+0xed/0x140 [ 1435.070801] do_syscall_64+0x33/0x40 [ 1435.071365] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1435.072124] RIP: 0033:0x7f1b403e0b19 [ 1435.072694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1435.075333] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1435.076447] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1435.077510] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1435.078543] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1435.079580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1435.080624] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:28:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 01:28:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) 01:28:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48000000) 01:28:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 01:28:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 01:28:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a000000) 01:28:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) [ 1435.457202] FAULT_INJECTION: forcing a failure. [ 1435.457202] name failslab, interval 1, probability 0, space 0, times 0 [ 1435.458809] CPU: 1 PID: 31823 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1435.459859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1435.460979] Call Trace: [ 1435.461349] dump_stack+0x107/0x167 [ 1435.461881] should_fail.cold+0x5/0xa [ 1435.462398] ? create_object.isra.0+0x3a/0xa20 [ 1435.463021] should_failslab+0x5/0x20 [ 1435.463542] kmem_cache_alloc+0x5b/0x310 [ 1435.464095] create_object.isra.0+0x3a/0xa20 [ 1435.464703] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1435.465411] kmem_cache_alloc+0x159/0x310 [ 1435.465995] jbd2__journal_start+0x190/0x7e0 [ 1435.466604] __ext4_journal_start_sb+0x214/0x390 [ 1435.467257] ext4_dirty_inode+0xbc/0x130 [ 1435.467851] ? ext4_setattr+0x2160/0x2160 [ 1435.468412] __mark_inode_dirty+0x492/0xd40 [ 1435.469037] touch_atime+0x5ea/0x6e0 [ 1435.469549] ? atime_needs_update+0x600/0x600 [ 1435.470160] ? mark_page_accessed+0x125/0x10d0 [ 1435.470791] generic_file_buffered_read+0x191a/0x2920 [ 1435.471515] ? pagecache_get_page+0xc80/0xc80 [ 1435.472150] ? __lock_acquire+0xbb1/0x5b00 [ 1435.472773] generic_file_read_iter+0x33f/0x490 [ 1435.473415] ext4_file_read_iter+0x184/0x4c0 [ 1435.474011] __kernel_read+0x593/0xb30 [ 1435.474540] ? do_sendfile+0x11e0/0x11e0 [ 1435.475190] ? fsnotify_perm.part.0+0x22d/0x620 [ 1435.475987] ? security_file_permission+0xb1/0xe0 [ 1435.476674] kernel_read+0x52/0x70 [ 1435.477165] bprm_execve+0x767/0x1960 [ 1435.477691] ? open_exec+0x70/0x70 [ 1435.478173] ? copy_string_kernel+0x3b6/0x450 [ 1435.478783] do_execveat_common+0x772/0x8d0 [ 1435.479363] ? bprm_execve+0x1960/0x1960 [ 1435.479921] __x64_sys_execveat+0xed/0x140 [ 1435.480509] do_syscall_64+0x33/0x40 [ 1435.481013] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1435.481702] RIP: 0033:0x7fa24edbfb19 [ 1435.482200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1435.485052] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1435.486175] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1435.487200] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1435.488178] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1435.489275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1435.490291] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:28:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 01:28:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c000000) 01:28:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) [ 1435.573568] FAULT_INJECTION: forcing a failure. [ 1435.573568] name failslab, interval 1, probability 0, space 0, times 0 [ 1435.575168] CPU: 1 PID: 32025 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1435.576038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1435.577097] Call Trace: [ 1435.577459] dump_stack+0x107/0x167 [ 1435.577930] should_fail.cold+0x5/0xa [ 1435.578420] ? create_object.isra.0+0x3a/0xa20 [ 1435.579007] should_failslab+0x5/0x20 [ 1435.579497] kmem_cache_alloc+0x5b/0x310 [ 1435.580016] create_object.isra.0+0x3a/0xa20 [ 1435.580581] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1435.581226] kmem_cache_alloc+0x159/0x310 [ 1435.581753] jbd2__journal_start+0x190/0x7e0 [ 1435.582337] __ext4_journal_start_sb+0x214/0x390 [ 1435.582970] ext4_dirty_inode+0xbc/0x130 [ 1435.583493] ? ext4_setattr+0x2160/0x2160 [ 1435.584017] __mark_inode_dirty+0x492/0xd40 [ 1435.584596] touch_atime+0x5ea/0x6e0 [ 1435.585071] ? atime_needs_update+0x600/0x600 [ 1435.585728] ? mark_page_accessed+0x125/0x10d0 [ 1435.586316] generic_file_buffered_read+0x191a/0x2920 [ 1435.587007] ? pagecache_get_page+0xc80/0xc80 [ 1435.587588] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1435.588250] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1435.588832] ? trace_hardirqs_on+0x5b/0x180 [ 1435.589376] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1435.589946] ? finish_task_switch+0x126/0x5d0 [ 1435.590514] generic_file_read_iter+0x33f/0x490 [ 1435.591108] ? __schedule+0x82c/0x1ea0 [ 1435.591600] ext4_file_read_iter+0x184/0x4c0 [ 1435.592168] __kernel_read+0x593/0xb30 [ 1435.592664] ? do_sendfile+0x11e0/0x11e0 [ 1435.593224] ? fsnotify_perm.part.0+0x22d/0x620 [ 1435.593824] ? security_file_permission+0xb1/0xe0 [ 1435.594449] kernel_read+0x52/0x70 [ 1435.594900] bprm_execve+0x767/0x1960 [ 1435.595395] ? open_exec+0x70/0x70 [ 1435.595846] ? copy_string_kernel+0x3b6/0x450 [ 1435.596429] do_execveat_common+0x772/0x8d0 [ 1435.596980] ? bprm_execve+0x1960/0x1960 [ 1435.597517] __x64_sys_execveat+0xed/0x140 [ 1435.598080] do_syscall_64+0x33/0x40 [ 1435.598567] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1435.599201] RIP: 0033:0x7f1b403e0b19 [ 1435.599675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1435.601996] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1435.602975] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1435.603872] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1435.604821] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1435.605699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1435.606610] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:29:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68000000) 01:29:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) 01:29:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) 01:29:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f510100) 01:29:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 01:29:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 01:29:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 01:29:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) [ 1451.175369] FAULT_INJECTION: forcing a failure. [ 1451.175369] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.177078] CPU: 0 PID: 32267 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1451.178112] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1451.179301] Call Trace: [ 1451.179702] dump_stack+0x107/0x167 [ 1451.180246] should_fail.cold+0x5/0xa [ 1451.180819] ? load_elf_phdrs+0x103/0x210 [ 1451.181442] should_failslab+0x5/0x20 [ 1451.182007] __kmalloc+0x72/0x390 [ 1451.182538] load_elf_phdrs+0x103/0x210 [ 1451.183125] ? set_brk+0x180/0x180 [ 1451.183678] load_elf_binary+0x1ef/0x4bc0 [ 1451.184320] ? lock_acquire+0x197/0x470 [ 1451.184912] ? find_held_lock+0x2c/0x110 [ 1451.185527] ? bprm_execve+0x82d/0x1960 [ 1451.186123] ? elf_core_dump+0x37e0/0x37e0 [ 1451.186757] ? do_raw_read_unlock+0x3b/0x70 [ 1451.187390] ? _raw_read_unlock+0x1a/0x30 [ 1451.188003] ? load_misc_binary+0x605/0xb70 [ 1451.188665] bprm_execve+0x84e/0x1960 [ 1451.189256] ? open_exec+0x70/0x70 [ 1451.189788] ? copy_string_kernel+0x3b6/0x450 [ 1451.190475] do_execveat_common+0x772/0x8d0 [ 1451.191127] ? bprm_execve+0x1960/0x1960 [ 1451.191768] __x64_sys_execveat+0xed/0x140 [ 1451.192406] do_syscall_64+0x33/0x40 [ 1451.192970] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1451.193722] RIP: 0033:0x7fa24edbfb19 [ 1451.194281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1451.196926] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1451.198051] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1451.199094] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1451.200132] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1451.201179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1451.202223] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1451.203417] hpet: Lost 1 RTC interrupts [ 1451.230264] FAULT_INJECTION: forcing a failure. [ 1451.230264] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.232072] CPU: 0 PID: 32507 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1451.233087] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1451.234288] Call Trace: [ 1451.234680] dump_stack+0x107/0x167 [ 1451.235216] should_fail.cold+0x5/0xa [ 1451.235787] ? __request_module+0x2e0/0x920 [ 1451.236419] ? bprm_execve+0x9a0/0x1960 [ 1451.237006] should_failslab+0x5/0x20 [ 1451.237568] kmem_cache_alloc_trace+0x55/0x320 [ 1451.238243] ? bprm_execve+0x9a0/0x1960 [ 1451.238817] __request_module+0x2e0/0x920 [ 1451.239424] ? perf_trace_lock+0xac/0x490 [ 1451.240074] ? free_modprobe_argv+0x90/0x90 [ 1451.240722] ? __lockdep_reset_lock+0x180/0x180 [ 1451.241408] ? find_held_lock+0x2c/0x110 [ 1451.242009] ? bprm_execve+0x8f8/0x1960 [ 1451.242590] ? lock_downgrade+0x6d0/0x6d0 [ 1451.243190] ? elf_core_dump+0x3c50/0x3c50 [ 1451.243808] ? do_raw_read_unlock+0x3b/0x70 [ 1451.244430] ? _raw_read_unlock+0x1a/0x30 [ 1451.245033] ? load_misc_binary+0x605/0xb70 [ 1451.245673] bprm_execve+0x9a0/0x1960 [ 1451.246239] ? open_exec+0x70/0x70 [ 1451.246764] ? copy_string_kernel+0x3b6/0x450 [ 1451.247428] do_execveat_common+0x772/0x8d0 [ 1451.248059] ? bprm_execve+0x1960/0x1960 [ 1451.248679] __x64_sys_execveat+0xed/0x140 [ 1451.249301] do_syscall_64+0x33/0x40 [ 1451.249845] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1451.250587] RIP: 0033:0x7f1b403e0b19 [ 1451.251132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1451.253796] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1451.254904] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1451.255944] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1451.256992] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1451.258030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1451.259066] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1451.260224] hpet: Lost 1 RTC interrupts 01:29:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x38) 01:29:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) 01:29:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c000000) 01:29:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 01:29:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 01:29:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) [ 1465.487113] FAULT_INJECTION: forcing a failure. [ 1465.487113] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.488199] CPU: 1 PID: 33407 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1465.488815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1465.489544] Call Trace: [ 1465.489780] dump_stack+0x107/0x167 [ 1465.490102] should_fail.cold+0x5/0xa [ 1465.490441] ? create_object.isra.0+0x3a/0xa20 [ 1465.490843] should_failslab+0x5/0x20 [ 1465.491178] kmem_cache_alloc+0x5b/0x310 [ 1465.491538] create_object.isra.0+0x3a/0xa20 [ 1465.491923] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1465.492360] kmem_cache_alloc_trace+0x151/0x320 [ 1465.492778] ? bprm_execve+0x9a0/0x1960 [ 1465.493126] __request_module+0x2e0/0x920 [ 1465.493485] ? perf_trace_lock+0xac/0x490 [ 1465.493850] ? free_modprobe_argv+0x90/0x90 [ 1465.494223] ? __lockdep_reset_lock+0x180/0x180 [ 1465.494631] ? find_held_lock+0x2c/0x110 [ 1465.494987] ? bprm_execve+0x8f8/0x1960 [ 1465.495333] ? lock_downgrade+0x6d0/0x6d0 01:29:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) 01:29:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) 01:29:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) [ 1465.495698] ? elf_core_dump+0x3c50/0x3c50 [ 1465.496220] ? do_raw_read_unlock+0x3b/0x70 [ 1465.496613] ? _raw_read_unlock+0x1a/0x30 [ 1465.496985] ? load_misc_binary+0x605/0xb70 [ 1465.497374] bprm_execve+0x9a0/0x1960 [ 1465.497712] ? open_exec+0x70/0x70 [ 1465.498026] ? copy_string_kernel+0x3b6/0x450 [ 1465.498417] do_execveat_common+0x772/0x8d0 [ 1465.498801] ? bprm_execve+0x1960/0x1960 [ 1465.499161] __x64_sys_execveat+0xed/0x140 [ 1465.499530] do_syscall_64+0x33/0x40 [ 1465.499866] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1465.500309] RIP: 0033:0x7f1b403e0b19 [ 1465.500638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1465.502330] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1465.502987] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1465.503593] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1465.504202] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1465.504827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1465.505442] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:29:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) 01:29:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 01:29:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) 01:29:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) [ 1465.554275] FAULT_INJECTION: forcing a failure. [ 1465.554275] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.556140] CPU: 0 PID: 33483 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1465.557148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1465.558331] Call Trace: [ 1465.558732] dump_stack+0x107/0x167 [ 1465.559273] should_fail.cold+0x5/0xa [ 1465.559839] ? create_object.isra.0+0x3a/0xa20 [ 1465.560508] should_failslab+0x5/0x20 [ 1465.561079] kmem_cache_alloc+0x5b/0x310 [ 1465.561688] create_object.isra.0+0x3a/0xa20 [ 1465.562329] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1465.563076] __kmalloc+0x16e/0x390 [ 1465.563611] load_elf_phdrs+0x103/0x210 [ 1465.564219] ? set_brk+0x180/0x180 [ 1465.564774] load_elf_binary+0x1ef/0x4bc0 [ 1465.565416] ? lock_acquire+0x197/0x470 [ 1465.566005] ? find_held_lock+0x2c/0x110 [ 1465.566615] ? bprm_execve+0x82d/0x1960 [ 1465.567198] ? elf_core_dump+0x37e0/0x37e0 [ 1465.567824] ? do_raw_read_unlock+0x3b/0x70 [ 1465.568452] ? _raw_read_unlock+0x1a/0x30 [ 1465.569066] ? load_misc_binary+0x605/0xb70 [ 1465.569720] bprm_execve+0x84e/0x1960 [ 1465.570301] ? open_exec+0x70/0x70 [ 1465.570824] ? copy_string_kernel+0x3b6/0x450 [ 1465.571500] do_execveat_common+0x772/0x8d0 [ 1465.572136] ? bprm_execve+0x1960/0x1960 [ 1465.572779] __x64_sys_execveat+0xed/0x140 [ 1465.573417] do_syscall_64+0x33/0x40 [ 1465.573963] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1465.574699] RIP: 0033:0x7fa24edbfb19 [ 1465.575251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1465.577869] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1465.578976] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1465.580008] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1465.581048] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1465.582070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1465.583098] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1465.584290] hpet: Lost 1 RTC interrupts [ 1465.622653] FAULT_INJECTION: forcing a failure. [ 1465.622653] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.623721] CPU: 1 PID: 33712 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1465.624287] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1465.624976] Call Trace: [ 1465.625213] dump_stack+0x107/0x167 [ 1465.625519] should_fail.cold+0x5/0xa 01:29:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 01:29:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) [ 1465.625848] ? bprm_execve+0x9a0/0x1960 [ 1465.626347] should_failslab+0x5/0x20 [ 1465.626738] __kmalloc_track_caller+0x79/0x370 [ 1465.627159] ? __request_module+0x2fe/0x920 [ 1465.627525] ? bprm_execve+0x9a0/0x1960 [ 1465.627859] kstrdup+0x36/0x70 [ 1465.628125] __request_module+0x2fe/0x920 [ 1465.628469] ? perf_trace_lock+0xac/0x490 [ 1465.628820] ? free_modprobe_argv+0x90/0x90 [ 1465.629178] ? __lockdep_reset_lock+0x180/0x180 [ 1465.629573] ? find_held_lock+0x2c/0x110 [ 1465.629910] ? bprm_execve+0x8f8/0x1960 [ 1465.630245] ? lock_downgrade+0x6d0/0x6d0 [ 1465.630585] ? elf_core_dump+0x3c50/0x3c50 [ 1465.630939] ? do_raw_read_unlock+0x3b/0x70 [ 1465.631295] ? _raw_read_unlock+0x1a/0x30 [ 1465.631636] ? load_misc_binary+0x605/0xb70 [ 1465.631996] bprm_execve+0x9a0/0x1960 [ 1465.632315] ? open_exec+0x70/0x70 [ 1465.632611] ? copy_string_kernel+0x3b6/0x450 [ 1465.632998] do_execveat_common+0x772/0x8d0 [ 1465.633355] ? bprm_execve+0x1960/0x1960 [ 1465.633700] __x64_sys_execveat+0xed/0x140 [ 1465.634053] do_syscall_64+0x33/0x40 [ 1465.634361] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1465.634782] RIP: 0033:0x7f1b403e0b19 [ 1465.635096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1465.636601] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1465.637235] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1465.637819] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1465.638407] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1465.638990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1465.639578] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:29:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a000000) 01:29:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 01:29:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) 01:29:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) 01:29:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 01:29:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 01:29:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) [ 1465.806774] FAULT_INJECTION: forcing a failure. [ 1465.806774] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.807765] CPU: 1 PID: 34241 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1465.808313] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1465.808992] Call Trace: [ 1465.809212] dump_stack+0x107/0x167 [ 1465.809509] should_fail.cold+0x5/0xa [ 1465.809823] ? create_object.isra.0+0x3a/0xa20 [ 1465.810199] should_failslab+0x5/0x20 [ 1465.810515] kmem_cache_alloc+0x5b/0x310 [ 1465.810850] create_object.isra.0+0x3a/0xa20 [ 1465.811206] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1465.811621] __kmalloc_track_caller+0x177/0x370 [ 1465.812002] ? __request_module+0x2fe/0x920 [ 1465.812358] ? bprm_execve+0x9a0/0x1960 [ 1465.812681] kstrdup+0x36/0x70 [ 1465.812952] __request_module+0x2fe/0x920 [ 1465.813290] ? perf_trace_lock+0xac/0x490 [ 1465.813630] ? free_modprobe_argv+0x90/0x90 [ 1465.813983] ? __lockdep_reset_lock+0x180/0x180 [ 1465.814481] ? find_held_lock+0x2c/0x110 [ 1465.814810] ? bprm_execve+0x8f8/0x1960 [ 1465.815135] ? lock_downgrade+0x6d0/0x6d0 [ 1465.815470] ? elf_core_dump+0x3c50/0x3c50 [ 1465.815816] ? do_raw_read_unlock+0x3b/0x70 [ 1465.816169] ? _raw_read_unlock+0x1a/0x30 [ 1465.816505] ? load_misc_binary+0x605/0xb70 [ 1465.816869] bprm_execve+0x9a0/0x1960 [ 1465.817184] ? open_exec+0x70/0x70 [ 1465.817476] ? copy_string_kernel+0x3b6/0x450 [ 1465.817846] do_execveat_common+0x772/0x8d0 [ 1465.818196] ? bprm_execve+0x1960/0x1960 [ 1465.818539] __x64_sys_execveat+0xed/0x140 [ 1465.818882] do_syscall_64+0x33/0x40 [ 1465.819183] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1465.819601] RIP: 0033:0x7f1b403e0b19 [ 1465.819905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1465.821375] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1465.821998] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1465.822568] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1465.823144] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1465.823721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1465.824290] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:29:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) [ 1465.894879] FAULT_INJECTION: forcing a failure. [ 1465.894879] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.895937] CPU: 1 PID: 34412 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1465.896495] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1465.897167] Call Trace: [ 1465.897395] dump_stack+0x107/0x167 [ 1465.897701] should_fail.cold+0x5/0xa [ 1465.898016] ? __request_module+0x2e0/0x920 [ 1465.898377] ? bprm_execve+0x9a0/0x1960 [ 1465.898708] should_failslab+0x5/0x20 [ 1465.899021] kmem_cache_alloc_trace+0x55/0x320 [ 1465.899408] ? __request_module+0x200/0x920 [ 1465.899763] ? bprm_execve+0x9a0/0x1960 [ 1465.900085] __request_module+0x2e0/0x920 [ 1465.900422] ? perf_trace_lock+0xac/0x490 [ 1465.900767] ? free_modprobe_argv+0x90/0x90 [ 1465.901118] ? __lockdep_reset_lock+0x180/0x180 [ 1465.901503] ? find_held_lock+0x2c/0x110 [ 1465.901829] ? bprm_execve+0x8f8/0x1960 [ 1465.902151] ? lock_downgrade+0x6d0/0x6d0 [ 1465.902493] ? elf_core_dump+0x3c50/0x3c50 [ 1465.902840] ? do_raw_read_unlock+0x3b/0x70 [ 1465.903191] ? _raw_read_unlock+0x1a/0x30 [ 1465.903528] ? load_misc_binary+0x605/0xb70 [ 1465.903886] bprm_execve+0x9a0/0x1960 [ 1465.904202] ? open_exec+0x70/0x70 [ 1465.904501] ? copy_string_kernel+0x3b6/0x450 [ 1465.904877] do_execveat_common+0x772/0x8d0 [ 1465.905230] ? bprm_execve+0x1960/0x1960 [ 1465.905577] __x64_sys_execveat+0xed/0x140 [ 1465.905924] do_syscall_64+0x33/0x40 [ 1465.906230] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1465.906646] RIP: 0033:0x7fa24edbfb19 [ 1465.906955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1465.908547] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1465.909171] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1465.909744] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1465.910321] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1465.910900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1465.911473] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:29:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) 01:29:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 01:29:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f510100) 01:29:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 01:29:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0020000) 01:29:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) 01:29:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 01:29:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) [ 1479.521435] FAULT_INJECTION: forcing a failure. [ 1479.521435] name failslab, interval 1, probability 0, space 0, times 0 [ 1479.523663] CPU: 0 PID: 34777 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1479.524888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1479.526281] Call Trace: [ 1479.526687] dump_stack+0x107/0x167 [ 1479.527238] should_fail.cold+0x5/0xa [ 1479.527819] ? __request_module+0x2e0/0x920 [ 1479.528471] ? bprm_execve+0x9a0/0x1960 [ 1479.529072] should_failslab+0x5/0x20 [ 1479.529645] kmem_cache_alloc_trace+0x55/0x320 [ 1479.530339] ? bprm_execve+0x9a0/0x1960 [ 1479.530932] __request_module+0x2e0/0x920 [ 1479.531559] ? free_modprobe_argv+0x90/0x90 [ 1479.532210] ? __lockdep_reset_lock+0x180/0x180 [ 1479.532934] ? find_held_lock+0x2c/0x110 [ 1479.533554] ? bprm_execve+0x8f8/0x1960 [ 1479.534156] ? lock_downgrade+0x6d0/0x6d0 [ 1479.534806] ? elf_core_dump+0x3c50/0x3c50 [ 1479.535439] ? do_raw_read_unlock+0x3b/0x70 [ 1479.536078] ? _raw_read_unlock+0x1a/0x30 [ 1479.536693] ? load_misc_binary+0x605/0xb70 [ 1479.537370] bprm_execve+0x9a0/0x1960 [ 1479.537959] ? open_exec+0x70/0x70 [ 1479.538495] ? copy_string_kernel+0x3b6/0x450 [ 1479.539183] do_execveat_common+0x772/0x8d0 [ 1479.539831] ? bprm_execve+0x1960/0x1960 [ 1479.540470] __x64_sys_execveat+0xed/0x140 [ 1479.541120] do_syscall_64+0x33/0x40 [ 1479.541678] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1479.542432] RIP: 0033:0x7fa24edbfb19 [ 1479.542987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1479.545663] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1479.546786] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1479.547832] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1479.548883] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1479.549931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1479.550981] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1479.552204] hpet: Lost 1 RTC interrupts [ 1479.569148] FAULT_INJECTION: forcing a failure. [ 1479.569148] name failslab, interval 1, probability 0, space 0, times 0 [ 1479.570915] CPU: 0 PID: 34782 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1479.571924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1479.573130] Call Trace: [ 1479.573525] dump_stack+0x107/0x167 [ 1479.574061] should_fail.cold+0x5/0xa [ 1479.574638] ? call_usermodehelper_setup+0xa2/0x2f0 [ 1479.575375] should_failslab+0x5/0x20 [ 1479.575936] kmem_cache_alloc_trace+0x55/0x320 [ 1479.576616] call_usermodehelper_setup+0xa2/0x2f0 [ 1479.577331] ? copy_regset_to_user+0x170/0x170 [ 1479.578003] ? bprm_execve+0x9a0/0x1960 [ 1479.578590] __request_module+0x3f9/0x920 [ 1479.579202] ? perf_trace_lock+0xac/0x490 [ 1479.579812] ? free_modprobe_argv+0x90/0x90 [ 1479.580452] ? __lockdep_reset_lock+0x180/0x180 [ 1479.581152] ? find_held_lock+0x2c/0x110 [ 1479.581792] ? bprm_execve+0x8f8/0x1960 [ 1479.582375] ? lock_downgrade+0x6d0/0x6d0 [ 1479.582980] ? elf_core_dump+0x3c50/0x3c50 [ 1479.583601] ? do_raw_read_unlock+0x3b/0x70 [ 1479.584231] ? _raw_read_unlock+0x1a/0x30 [ 1479.584837] ? load_misc_binary+0x605/0xb70 [ 1479.585487] bprm_execve+0x9a0/0x1960 [ 1479.586055] ? open_exec+0x70/0x70 [ 1479.586580] ? copy_string_kernel+0x3b6/0x450 [ 1479.587256] do_execveat_common+0x772/0x8d0 [ 1479.587893] ? bprm_execve+0x1960/0x1960 [ 1479.588508] __x64_sys_execveat+0xed/0x140 [ 1479.589138] do_syscall_64+0x33/0x40 [ 1479.589690] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1479.590438] RIP: 0033:0x7f1b403e0b19 [ 1479.590987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1479.593665] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1479.594776] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1479.595815] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1479.596852] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1479.597887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1479.598932] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1479.600085] hpet: Lost 1 RTC interrupts 01:29:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) 01:29:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) 01:29:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) 01:29:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a0000) 01:29:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 01:29:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) 01:29:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 01:29:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) [ 1479.848983] FAULT_INJECTION: forcing a failure. [ 1479.848983] name failslab, interval 1, probability 0, space 0, times 0 [ 1479.850749] CPU: 0 PID: 35444 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1479.851757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1479.852968] Call Trace: [ 1479.853364] dump_stack+0x107/0x167 [ 1479.853905] should_fail.cold+0x5/0xa [ 1479.854469] ? create_object.isra.0+0x3a/0xa20 [ 1479.855139] should_failslab+0x5/0x20 [ 1479.855701] kmem_cache_alloc+0x5b/0x310 [ 1479.856302] create_object.isra.0+0x3a/0xa20 [ 1479.856960] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1479.857712] kmem_cache_alloc_trace+0x151/0x320 [ 1479.858406] call_usermodehelper_setup+0xa2/0x2f0 [ 1479.859114] ? copy_regset_to_user+0x170/0x170 [ 1479.859765] ? bprm_execve+0x9a0/0x1960 [ 1479.860346] __request_module+0x3f9/0x920 [ 1479.860936] ? perf_trace_lock+0xac/0x490 [ 1479.861546] ? free_modprobe_argv+0x90/0x90 [ 1479.862155] ? __lockdep_reset_lock+0x180/0x180 [ 1479.862880] ? find_held_lock+0x2c/0x110 [ 1479.863458] ? bprm_execve+0x8f8/0x1960 [ 1479.864042] ? lock_downgrade+0x6d0/0x6d0 [ 1479.864627] ? elf_core_dump+0x3c50/0x3c50 [ 1479.865259] ? do_raw_read_unlock+0x3b/0x70 [ 1479.865867] ? _raw_read_unlock+0x1a/0x30 [ 1479.866470] ? load_misc_binary+0x605/0xb70 [ 1479.867088] bprm_execve+0x9a0/0x1960 [ 1479.867659] ? open_exec+0x70/0x70 [ 1479.868161] ? copy_string_kernel+0x3b6/0x450 [ 1479.868319] FAULT_INJECTION: forcing a failure. [ 1479.868319] name failslab, interval 1, probability 0, space 0, times 0 [ 1479.868830] do_execveat_common+0x772/0x8d0 [ 1479.868857] ? bprm_execve+0x1960/0x1960 [ 1479.871667] __x64_sys_execveat+0xed/0x140 [ 1479.872265] do_syscall_64+0x33/0x40 [ 1479.872813] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1479.873527] RIP: 0033:0x7f1b403e0b19 [ 1479.874072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1479.876597] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1479.877715] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1479.878707] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1479.879737] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1479.880721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1479.881758] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 [ 1479.882788] CPU: 1 PID: 35484 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1479.882895] hpet: Lost 1 RTC interrupts [ 1479.883819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1479.885529] Call Trace: [ 1479.885925] dump_stack+0x107/0x167 [ 1479.886447] should_fail.cold+0x5/0xa [ 1479.887018] ? bprm_execve+0x9a0/0x1960 [ 1479.887583] should_failslab+0x5/0x20 [ 1479.888152] __kmalloc_track_caller+0x79/0x370 [ 1479.888798] ? __request_module+0x2fe/0x920 [ 1479.889441] ? bprm_execve+0x9a0/0x1960 [ 1479.890001] kstrdup+0x36/0x70 [ 1479.890480] __request_module+0x2fe/0x920 [ 1479.891068] ? perf_trace_lock+0xac/0x490 [ 1479.891678] ? free_modprobe_argv+0x90/0x90 [ 1479.892291] ? __lockdep_reset_lock+0x180/0x180 [ 1479.892998] ? find_held_lock+0x2c/0x110 [ 1479.893582] ? bprm_execve+0x8f8/0x1960 [ 1479.894324] ? lock_downgrade+0x6d0/0x6d0 [ 1479.894917] ? elf_core_dump+0x3c50/0x3c50 [ 1479.895544] ? do_raw_read_unlock+0x3b/0x70 [ 1479.896149] ? _raw_read_unlock+0x1a/0x30 [ 1479.896755] ? load_misc_binary+0x605/0xb70 [ 1479.897387] bprm_execve+0x9a0/0x1960 [ 1479.897958] ? open_exec+0x70/0x70 [ 1479.898467] ? copy_string_kernel+0x3b6/0x450 [ 1479.899134] do_execveat_common+0x772/0x8d0 [ 1479.899745] ? bprm_execve+0x1960/0x1960 [ 1479.900358] __x64_sys_execveat+0xed/0x140 [ 1479.900976] do_syscall_64+0x33/0x40 [ 1479.901525] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1479.902245] RIP: 0033:0x7fa24edbfb19 [ 1479.902794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1479.905353] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1479.906468] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1479.907462] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1479.908459] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1479.909467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1479.910561] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:29:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) 01:29:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 01:29:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 01:29:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) 01:29:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 01:29:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 01:29:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) 01:29:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002) [ 1493.378275] FAULT_INJECTION: forcing a failure. [ 1493.378275] name failslab, interval 1, probability 0, space 0, times 0 [ 1493.379968] CPU: 1 PID: 36071 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1493.380977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1493.382188] Call Trace: [ 1493.382584] dump_stack+0x107/0x167 [ 1493.383116] should_fail.cold+0x5/0xa [ 1493.383673] ? create_object.isra.0+0x3a/0xa20 [ 1493.384345] should_failslab+0x5/0x20 [ 1493.384911] kmem_cache_alloc+0x5b/0x310 [ 1493.385520] create_object.isra.0+0x3a/0xa20 [ 1493.386164] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1493.386908] __kmalloc_track_caller+0x177/0x370 [ 1493.387588] ? __request_module+0x2fe/0x920 [ 1493.388227] ? bprm_execve+0x9a0/0x1960 [ 1493.388810] kstrdup+0x36/0x70 [ 1493.389277] __request_module+0x2fe/0x920 [ 1493.389884] ? perf_trace_lock+0xac/0x490 [ 1493.390494] ? free_modprobe_argv+0x90/0x90 [ 1493.391126] ? __lockdep_reset_lock+0x180/0x180 [ 1493.391816] ? find_held_lock+0x2c/0x110 [ 1493.392495] ? bprm_execve+0x8f8/0x1960 [ 1493.393093] ? lock_downgrade+0x6d0/0x6d0 [ 1493.393695] ? elf_core_dump+0x3c50/0x3c50 [ 1493.394314] ? do_raw_read_unlock+0x3b/0x70 [ 1493.394940] ? _raw_read_unlock+0x1a/0x30 [ 1493.395518] ? load_misc_binary+0x605/0xb70 [ 1493.396158] bprm_execve+0x9a0/0x1960 [ 1493.396722] ? open_exec+0x70/0x70 [ 1493.397254] ? copy_string_kernel+0x3b6/0x450 [ 1493.397915] do_execveat_common+0x772/0x8d0 [ 1493.398548] ? bprm_execve+0x1960/0x1960 [ 1493.399159] __x64_sys_execveat+0xed/0x140 [ 1493.399779] do_syscall_64+0x33/0x40 [ 1493.400321] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1493.401069] RIP: 0033:0x7fa24edbfb19 [ 1493.401615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1493.404250] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1493.405360] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1493.406385] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1493.407409] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1493.408529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1493.409574] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1493.410930] FAULT_INJECTION: forcing a failure. [ 1493.410930] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1493.412065] CPU: 0 PID: 36013 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1493.412876] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1493.413618] Call Trace: [ 1493.413865] dump_stack+0x107/0x167 [ 1493.414196] should_fail.cold+0x5/0xa [ 1493.414548] __alloc_pages_nodemask+0x182/0x600 [ 1493.414975] ? mark_held_locks+0x9e/0xe0 [ 1493.415342] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1493.415890] ? kmem_cache_free+0xa7/0x2d0 [ 1493.416274] alloc_pages_current+0x187/0x280 [ 1493.416675] __get_free_pages+0xc/0xa0 [ 1493.417032] ? kmem_cache_free+0x249/0x2d0 [ 1493.417417] tlb_remove_table+0x3ca/0xcb0 [ 1493.417802] ___pte_free_tlb+0x86/0xb0 [ 1493.418159] free_pgd_range+0x747/0x1380 [ 1493.418541] free_pgtables+0x230/0x2f0 [ 1493.418897] exit_mmap+0x28e/0x4f0 [ 1493.419216] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1493.419702] mmput+0xca/0x340 [ 1493.419993] free_bprm+0x65/0x2e0 [ 1493.420317] do_execveat_common+0x2e1/0x8d0 [ 1493.420711] ? bprm_execve+0x1960/0x1960 [ 1493.421093] __x64_sys_execveat+0xed/0x140 [ 1493.421483] do_syscall_64+0x33/0x40 [ 1493.421817] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1493.422274] RIP: 0033:0x7f1b403e0b19 [ 1493.422609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1493.424291] RSP: 002b:00007f1b3d956188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1493.424982] RAX: ffffffffffffffda RBX: 00007f1b404f3f60 RCX: 00007f1b403e0b19 [ 1493.425624] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1493.426261] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1493.426897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1493.427534] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:29:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a) 01:29:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x38000000) 01:29:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) [ 1493.604281] FAULT_INJECTION: forcing a failure. [ 1493.604281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1493.605318] CPU: 0 PID: 36776 Comm: syz-executor.5 Not tainted 5.10.223 #1 [ 1493.605876] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1493.606555] Call Trace: [ 1493.606781] dump_stack+0x107/0x167 [ 1493.607084] should_fail.cold+0x5/0xa [ 1493.607401] _copy_to_user+0x2e/0x180 [ 1493.607717] simple_read_from_buffer+0xcc/0x160 [ 1493.608096] proc_fail_nth_read+0x198/0x230 [ 1493.608444] ? proc_sessionid_read+0x230/0x230 [ 1493.608823] ? security_file_permission+0xb1/0xe0 [ 1493.609228] ? proc_sessionid_read+0x230/0x230 [ 1493.609602] vfs_read+0x228/0x620 [ 1493.609893] ksys_read+0x12d/0x260 [ 1493.610186] ? vfs_write+0xb10/0xb10 [ 1493.610498] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1493.610928] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1493.611345] do_syscall_64+0x33/0x40 [ 1493.611683] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1493.612101] RIP: 0033:0x7f1b4039369c [ 1493.612404] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1493.613871] RSP: 002b:00007f1b3d956170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1493.614488] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f1b4039369c [ 1493.615066] RDX: 000000000000000f RSI: 00007f1b3d9561e0 RDI: 0000000000000003 [ 1493.615647] RBP: 00007f1b3d9561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1493.616223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1493.616802] R13: 00007ffffbef44bf R14: 00007f1b3d956300 R15: 0000000000022000 01:30:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:30:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1517f) 01:30:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 01:30:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) 01:30:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 01:30:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 01:30:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) 01:30:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff) [ 1507.228074] FAULT_INJECTION: forcing a failure. [ 1507.228074] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.230265] CPU: 1 PID: 36858 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1507.231529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1507.233039] Call Trace: [ 1507.233565] dump_stack+0x107/0x167 [ 1507.234235] should_fail.cold+0x5/0xa [ 1507.234946] ? call_usermodehelper_setup+0xa2/0x2f0 [ 1507.235862] should_failslab+0x5/0x20 [ 1507.236570] kmem_cache_alloc_trace+0x55/0x320 [ 1507.237526] call_usermodehelper_setup+0xa2/0x2f0 [ 1507.238410] ? copy_regset_to_user+0x170/0x170 [ 1507.239254] ? bprm_execve+0x9a0/0x1960 [ 1507.239987] __request_module+0x3f9/0x920 [ 1507.240750] ? perf_trace_lock+0xac/0x490 [ 1507.241384] ? free_modprobe_argv+0x90/0x90 [ 1507.242177] ? __lockdep_reset_lock+0x180/0x180 [ 1507.243047] ? find_held_lock+0x2c/0x110 [ 1507.243818] ? bprm_execve+0x8f8/0x1960 [ 1507.244543] ? lock_downgrade+0x6d0/0x6d0 [ 1507.245301] ? elf_core_dump+0x3c50/0x3c50 [ 1507.246086] ? do_raw_read_unlock+0x3b/0x70 [ 1507.246881] ? _raw_read_unlock+0x1a/0x30 [ 1507.247638] ? load_misc_binary+0x605/0xb70 [ 1507.248440] bprm_execve+0x9a0/0x1960 [ 1507.249077] ? open_exec+0x70/0x70 [ 1507.249752] ? copy_string_kernel+0x3b6/0x450 [ 1507.250599] do_execveat_common+0x772/0x8d0 [ 1507.251399] ? bprm_execve+0x1960/0x1960 [ 1507.252186] __x64_sys_execveat+0xed/0x140 [ 1507.253040] do_syscall_64+0x33/0x40 [ 1507.253746] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1507.254685] RIP: 0033:0x7fa24edbfb19 [ 1507.255374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1507.258720] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1507.259866] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1507.260907] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1507.261963] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1507.263008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1507.264056] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:30:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 01:30:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48000000) 01:30:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f0) 01:30:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0020000) 01:30:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 01:30:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff) 01:30:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) 01:30:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 01:30:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c000000) 01:30:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 01:30:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a0000) 01:30:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) [ 1507.580498] FAULT_INJECTION: forcing a failure. [ 1507.580498] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.582273] CPU: 1 PID: 37362 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1507.583288] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1507.584495] Call Trace: [ 1507.584904] dump_stack+0x107/0x167 [ 1507.585458] should_fail.cold+0x5/0xa [ 1507.586028] ? create_object.isra.0+0x3a/0xa20 [ 1507.586708] should_failslab+0x5/0x20 [ 1507.587284] kmem_cache_alloc+0x5b/0x310 [ 1507.587897] create_object.isra.0+0x3a/0xa20 [ 1507.588555] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1507.589489] kmem_cache_alloc_trace+0x151/0x320 [ 1507.590201] call_usermodehelper_setup+0xa2/0x2f0 [ 1507.590921] ? copy_regset_to_user+0x170/0x170 [ 1507.591601] ? bprm_execve+0x9a0/0x1960 [ 1507.592198] __request_module+0x3f9/0x920 [ 1507.592817] ? perf_trace_lock+0xac/0x490 [ 1507.593448] ? free_modprobe_argv+0x90/0x90 [ 1507.594098] ? __lockdep_reset_lock+0x180/0x180 [ 1507.594801] ? find_held_lock+0x2c/0x110 [ 1507.595413] ? bprm_execve+0x8f8/0x1960 [ 1507.596008] ? lock_downgrade+0x6d0/0x6d0 [ 1507.596707] ? elf_core_dump+0x3c50/0x3c50 [ 1507.597351] ? do_raw_read_unlock+0x3b/0x70 [ 1507.597996] ? _raw_read_unlock+0x1a/0x30 [ 1507.598608] ? load_misc_binary+0x605/0xb70 [ 1507.599259] bprm_execve+0x9a0/0x1960 [ 1507.599842] ? open_exec+0x70/0x70 [ 1507.600370] ? copy_string_kernel+0x3b6/0x450 [ 1507.601050] do_execveat_common+0x772/0x8d0 [ 1507.601710] ? bprm_execve+0x1960/0x1960 [ 1507.602336] __x64_sys_execveat+0xed/0x140 [ 1507.602969] do_syscall_64+0x33/0x40 [ 1507.603526] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1507.604278] RIP: 0033:0x7fa24edbfb19 [ 1507.604835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1507.607521] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1507.608644] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1507.609697] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1507.610748] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1507.611796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1507.612911] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:30:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 01:30:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) 01:30:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f) 01:30:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 01:30:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) 01:30:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68000000) 01:30:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 01:30:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002) 01:30:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff) [ 1521.628892] FAULT_INJECTION: forcing a failure. [ 1521.628892] name failslab, interval 1, probability 0, space 0, times 0 [ 1521.630717] CPU: 0 PID: 38776 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1521.631759] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1521.632988] Call Trace: [ 1521.633402] dump_stack+0x107/0x167 [ 1521.633960] should_fail.cold+0x5/0xa [ 1521.634543] ? load_elf_phdrs+0x103/0x210 [ 1521.635198] should_failslab+0x5/0x20 [ 1521.635789] __kmalloc+0x72/0x390 [ 1521.636346] load_elf_phdrs+0x103/0x210 [ 1521.636965] ? set_brk+0x180/0x180 [ 1521.637560] load_elf_binary+0x1ef/0x4bc0 [ 1521.638273] ? lock_acquire+0x197/0x470 [ 1521.638890] ? find_held_lock+0x2c/0x110 [ 1521.639533] ? bprm_execve+0xa33/0x1960 [ 1521.640152] ? elf_core_dump+0x37e0/0x37e0 [ 1521.640811] ? do_raw_read_unlock+0x3b/0x70 [ 1521.641484] ? _raw_read_unlock+0x1a/0x30 [ 1521.642122] ? load_misc_binary+0x605/0xb70 [ 1521.642812] bprm_execve+0xa54/0x1960 [ 1521.643426] ? open_exec+0x70/0x70 [ 1521.643987] ? copy_string_kernel+0x3b6/0x450 [ 1521.644703] do_execveat_common+0x772/0x8d0 [ 1521.645388] ? bprm_execve+0x1960/0x1960 [ 1521.646054] __x64_sys_execveat+0xed/0x140 [ 1521.646718] do_syscall_64+0x33/0x40 [ 1521.647295] entry_SYSCALL_64_after_hwframe+0x67/0xd1 01:30:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) [ 1521.648082] RIP: 0033:0x7fa24edbfb19 [ 1521.648800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1521.651448] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1521.652550] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1521.653592] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1521.654621] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1521.655649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1521.656674] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1521.657918] hpet: Lost 1 RTC interrupts 01:30:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 01:30:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c000000) 01:30:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) 01:30:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a) 01:30:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 01:30:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff) 01:30:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) [ 1521.962428] FAULT_INJECTION: forcing a failure. [ 1521.962428] name failslab, interval 1, probability 0, space 0, times 0 [ 1521.964312] CPU: 0 PID: 39698 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1521.965325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1521.966545] Call Trace: [ 1521.966945] dump_stack+0x107/0x167 [ 1521.967486] should_fail.cold+0x5/0xa [ 1521.968050] ? load_elf_phdrs+0x103/0x210 [ 1521.968662] should_failslab+0x5/0x20 [ 1521.969231] __kmalloc+0x72/0x390 [ 1521.969757] load_elf_phdrs+0x103/0x210 [ 1521.970336] ? set_brk+0x180/0x180 [ 1521.970894] load_elf_binary+0x1ef/0x4bc0 [ 1521.971539] ? lock_acquire+0x197/0x470 [ 1521.972118] ? find_held_lock+0x2c/0x110 [ 1521.972727] ? bprm_execve+0xa33/0x1960 [ 1521.973322] ? elf_core_dump+0x37e0/0x37e0 [ 1521.973942] ? do_raw_read_unlock+0x3b/0x70 [ 1521.974578] ? _raw_read_unlock+0x1a/0x30 [ 1521.975177] ? load_misc_binary+0x605/0xb70 [ 1521.975826] bprm_execve+0xa54/0x1960 [ 1521.976408] ? open_exec+0x70/0x70 [ 1521.976936] ? copy_string_kernel+0x3b6/0x450 [ 1521.977621] do_execveat_common+0x772/0x8d0 [ 1521.978259] ? bprm_execve+0x1960/0x1960 [ 1521.978891] __x64_sys_execveat+0xed/0x140 [ 1521.979525] do_syscall_64+0x33/0x40 [ 1521.980072] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1521.980816] RIP: 0033:0x7fa24edbfb19 [ 1521.981367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1521.983986] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1521.985083] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1521.986116] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1521.987138] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1521.988161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1521.989185] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 [ 1521.990363] hpet: Lost 1 RTC interrupts 01:30:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 01:30:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) 01:30:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) 01:30:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 01:30:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) 01:30:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f) 01:30:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1517f) 01:30:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) [ 1535.636021] FAULT_INJECTION: forcing a failure. [ 1535.636021] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1535.638212] CPU: 0 PID: 40177 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1535.639235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1535.640442] Call Trace: [ 1535.640845] dump_stack+0x107/0x167 [ 1535.641391] should_fail.cold+0x5/0xa [ 1535.641979] __alloc_pages_nodemask+0x182/0x600 [ 1535.642669] ? mark_held_locks+0x9e/0xe0 [ 1535.643266] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1535.644166] ? kmem_cache_free+0xa7/0x2d0 [ 1535.644796] alloc_pages_current+0x187/0x280 [ 1535.645462] __get_free_pages+0xc/0xa0 [ 1535.646035] ? kmem_cache_free+0x249/0x2d0 [ 1535.646653] tlb_remove_table+0x3ca/0xcb0 [ 1535.647295] ___pte_free_tlb+0x86/0xb0 [ 1535.647883] free_pgd_range+0x747/0x1380 [ 1535.648534] free_pgtables+0x230/0x2f0 [ 1535.649119] exit_mmap+0x28e/0x4f0 [ 1535.649654] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1535.650484] mmput+0xca/0x340 [ 1535.650959] free_bprm+0x65/0x2e0 [ 1535.651476] do_execveat_common+0x2e1/0x8d0 [ 1535.652120] ? bprm_execve+0x1960/0x1960 [ 1535.652755] __x64_sys_execveat+0xed/0x140 [ 1535.653439] do_syscall_64+0x33/0x40 [ 1535.653990] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1535.654743] RIP: 0033:0x7fa24edbfb19 [ 1535.655294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1535.657955] RSP: 002b:00007fa24c335188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1535.659070] RAX: ffffffffffffffda RBX: 00007fa24eed2f60 RCX: 00007fa24edbfb19 [ 1535.660101] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1535.661132] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1535.662168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1535.663203] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:30:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000) 01:30:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) 01:30:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 01:30:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a000000) 01:30:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 01:30:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) 01:30:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) 01:30:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffb) [ 1536.046821] FAULT_INJECTION: forcing a failure. [ 1536.046821] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1536.048562] CPU: 0 PID: 41034 Comm: syz-executor.6 Not tainted 5.10.223 #1 [ 1536.049575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1536.050791] Call Trace: [ 1536.051197] dump_stack+0x107/0x167 [ 1536.051742] should_fail.cold+0x5/0xa [ 1536.052325] _copy_to_user+0x2e/0x180 [ 1536.052901] simple_read_from_buffer+0xcc/0x160 [ 1536.053604] proc_fail_nth_read+0x198/0x230 [ 1536.054252] ? proc_sessionid_read+0x230/0x230 [ 1536.054941] ? security_file_permission+0xb1/0xe0 [ 1536.055665] ? proc_sessionid_read+0x230/0x230 [ 1536.056336] vfs_read+0x228/0x620 [ 1536.056875] ksys_read+0x12d/0x260 [ 1536.057414] ? vfs_write+0xb10/0xb10 [ 1536.057985] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1536.058760] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1536.059536] do_syscall_64+0x33/0x40 [ 1536.060090] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1536.060837] RIP: 0033:0x7fa24ed7269c [ 1536.061374] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1536.064073] RSP: 002b:00007fa24c335170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1536.065269] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fa24ed7269c [ 1536.066323] RDX: 000000000000000f RSI: 00007fa24c3351e0 RDI: 0000000000000004 [ 1536.067366] RBP: 00007fa24c3351d0 R08: 0000000000000000 R09: 0000000000000000 [ 1536.068513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1536.069573] R13: 00007ffc86b8ab2f R14: 00007fa24c335300 R15: 0000000000022000 01:30:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 01:30:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:30:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 01:30:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) 01:30:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) 01:30:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 01:30:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffe) 01:30:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 01:30:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 01:30:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) 01:30:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 01:30:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 01:30:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 01:30:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) 01:30:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xaf2) 01:30:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffb) 01:30:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) 01:30:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) 01:30:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 01:31:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 01:31:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 01:31:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffe) 01:31:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) 01:31:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x38) 01:31:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 01:31:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) 01:31:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) 01:31:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) 01:31:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) 01:31:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0020000) 01:31:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) 01:31:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 01:31:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a0000) 01:31:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 01:31:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 01:31:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 01:31:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 01:31:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 01:31:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) 01:31:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 01:31:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 01:31:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) 01:31:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3800) 01:31:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 01:31:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) 01:31:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 01:31:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 01:31:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) 01:31:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 01:31:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 01:31:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff) 01:31:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 01:31:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 01:31:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) 01:31:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) 01:31:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 01:31:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48000000) 01:31:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 01:31:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff) 01:31:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 01:31:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) 01:31:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 01:31:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 01:31:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 01:31:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 01:31:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 01:31:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) 01:31:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f) 01:31:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c000000) 01:31:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 01:31:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 01:31:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) 01:31:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) 01:31:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 01:31:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f0) 01:31:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 01:31:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 01:31:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 01:31:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68000000) 01:31:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) 01:32:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) 01:32:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 01:32:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c000000) 01:32:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) 01:32:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 01:32:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) 01:32:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 01:32:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) 01:32:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) 01:32:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) 01:32:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 01:32:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) 01:32:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffb) 01:32:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 01:32:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000) 01:32:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 01:32:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 01:32:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 01:32:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a000000) 01:32:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) 01:32:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 01:32:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 01:32:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) 01:32:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffe) 01:32:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 01:32:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 01:32:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48000000) 01:32:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 01:32:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f510100) 01:32:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 01:32:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002) 01:32:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 01:32:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c000000) 01:32:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 01:32:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 01:32:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 01:32:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) 01:32:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 01:32:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a) 01:32:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) 01:32:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 01:32:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68000000) 01:32:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 01:32:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000) 01:32:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 01:32:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xaf2) 01:32:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) 01:32:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c000000) 01:32:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 01:32:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 01:32:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 01:32:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 01:32:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 01:32:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 01:32:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f0) 01:32:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) 01:32:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) 01:32:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 01:32:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) 01:32:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 01:32:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 01:32:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 01:32:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0020000) 01:33:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a000000) 01:33:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a0000) 01:33:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3800) 01:33:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) 01:33:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 01:33:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 01:33:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 01:33:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 01:33:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 01:33:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 01:33:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f510100) 01:33:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 01:33:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 01:33:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) 01:33:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 01:33:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 01:33:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) 01:33:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 01:33:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 01:33:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 01:33:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) 01:33:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff) 01:33:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) 01:33:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000) 01:33:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) 01:33:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 01:33:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 01:33:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff) 01:33:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 01:33:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) 01:33:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) 01:33:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) 01:33:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 01:33:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 01:33:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 01:33:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 01:33:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 01:33:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) 01:33:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) 01:33:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 01:33:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 01:33:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f) 01:33:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 01:33:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) 01:33:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) 01:33:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 01:33:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xaf2) 01:33:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0020000) 01:33:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 01:33:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) 01:33:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 01:33:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 01:33:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) 01:33:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 01:33:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a0000) 01:33:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 01:33:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 01:33:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) 01:33:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 01:33:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffb) 01:33:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 01:33:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 01:33:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 01:33:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffe) 01:33:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 01:33:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 01:33:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff) 01:33:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 01:33:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 01:33:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 01:33:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 01:33:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) 01:34:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 01:34:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002) 01:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) 01:34:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) 01:34:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) 01:34:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff) 01:34:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 01:34:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 01:34:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) 01:34:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x38000000) 01:34:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 01:34:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 01:34:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 01:34:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 01:34:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a) 01:34:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 01:34:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 01:34:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f) 01:34:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) 01:34:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 01:34:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 01:34:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48000000) 01:34:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) 01:34:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f51010000000000) 01:34:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 01:34:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000) 01:34:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 01:34:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) 01:34:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 01:34:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c000000) 01:34:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 01:34:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 01:34:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) 01:34:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 01:34:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68000000) 01:34:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 01:34:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) 01:34:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 01:34:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 01:34:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) 01:34:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) 01:34:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 01:34:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 01:34:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 01:34:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c000000) 01:34:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 01:34:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002) 01:34:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) 01:34:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffb) 01:34:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 01:34:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 01:34:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 01:34:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a000000000000) 01:34:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 01:34:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffe) 01:34:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 01:34:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a000000) 01:34:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a) 01:34:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 01:34:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) 01:34:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) 01:34:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 01:35:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 01:35:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 01:35:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) 01:35:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) 01:35:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1517f) 01:35:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) 01:35:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 01:35:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 01:35:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 01:35:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3800000000000000) 01:35:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 01:35:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 01:35:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) 01:35:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 01:35:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f51010000000000) 01:35:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) 01:35:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 01:35:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000) 01:35:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 01:35:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 01:35:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0020000) 01:35:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 01:35:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 01:35:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 01:35:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) 01:35:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 01:35:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 01:35:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a0000) 01:35:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) 01:35:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 01:35:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 01:35:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 01:35:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f00000000) 01:35:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 01:35:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) 01:35:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 01:35:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff) 01:35:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 01:35:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 01:35:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 01:35:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 01:35:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 01:35:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 01:35:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff) 01:35:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 01:35:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) 01:35:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000) 01:35:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 01:35:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f) 01:35:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 01:35:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 01:35:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a000000000000) 01:35:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 01:35:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) 01:35:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 01:35:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) 01:35:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 01:35:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) 01:35:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000403800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x13000, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = dup(r0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x1c, 0xc, 0xb, 0x13, 0xb, 0x5, 0x6, 0x39, 0xffffffffffffffff}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:36:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) 01:36:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 01:36:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f45bac3ffffffffffff00000000000003003e000000620b0000000000000000400000000040000000000002000000000000036718a48b9c2cfbea7d45cca1456740d60000000000008000000000000000"], 0xaf2) close(r0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd=r0, 0x0, 0x0, 0x2, 0x1, 0x1}, 0x5) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xfffffff8}}, './file1\x00'}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:36:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 01:36:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) 01:36:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 01:36:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 01:36:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 01:36:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x38000000) 01:36:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 01:36:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600010007000000000000000003003e0000000000000000000000000002000000000000000000003800020000000000000003d7f0799fa0337c5e87ded9aa48435d4db1c313c617f7eb11ea7800005aeb9a798cf8ec2b3a5ba71a193902e8184a81a17400"/114], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) r3 = openat(r2, &(0x7f00000001c0)='./file1\x00', 0x80, 0x0) sendfile(r1, r3, 0x0, 0x20d315) openat(r3, &(0x7f0000000140)='./file1\x00', 0x800, 0xa9) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f0000000180)={0x25, 0x36, 0x3, 0x1d, 0x7, 0x200, 0x5, 0x124, 0xffffffffffffffff}) 01:36:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffb) 01:36:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 01:36:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 01:36:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 01:36:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 01:36:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 01:36:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 01:36:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffe) 01:36:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 01:36:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) 01:36:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r2, r2, 0x0, 0x20d317) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000100)={0x3ff, 0x0, &(0x7f00000000c0)=[r0]}, 0x1) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRES32=r1], 0xaf2) utimensat(r1, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={{0x77359400}}, 0x100) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) listxattr(&(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)=""/201, 0xc9) 01:36:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 01:36:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) 01:36:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 01:36:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48000000) 01:36:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 01:36:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000001c0)={0x5c, 0xf, '\x00', [@calipso={0x7, 0x10, {0x2, 0x2, 0x20, 0x2, [0x101]}}, @ra={0x5, 0x2, 0xfffe}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @mcast1}, @ra={0x5, 0x2, 0x2}, @enc_lim={0x4, 0x1, 0x5}, @jumbo={0xc2, 0x4, 0x1}, @calipso={0x7, 0x28, {0x2, 0x8, 0x2, 0x9, [0x5, 0x9, 0x9, 0x4]}}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x88) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:36:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 01:36:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 01:36:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 01:36:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f00000000) 01:36:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c000000) 01:36:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 01:36:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 01:36:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 01:36:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 01:36:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffef, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x40046306, 0x1}], 0x2e, 0x0, &(0x7f0000000100)="e5c3394ab531ab971ff8a49d25c9c9a16efec4b20572e1c270fc1616c7a5947e60e46c7676128fa1f96e1f60229e"}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:36:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68000000) 01:36:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) 01:36:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) 01:36:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a000000000000) 01:36:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 01:36:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 01:36:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 01:36:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000) 01:36:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 01:36:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 01:36:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 01:36:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000007000000000020000000003e0000000000000009000000f52bfdd0000000000000000035a9f8941ff88c180000000038000200f62d5ebb85fc4d84022fe18188640d394eed3d98c4ba0020c4b80353f4"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:36:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c000000) 01:36:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) 01:36:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 01:36:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007040000000000000003003e000000000000000000001d0000400000000000000000000002000000000000000000003800020000000000030003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x3, 0x188) 01:36:49 executing program 3: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x100, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)='vlan0\x00', 0x1ff, 0x80000001, 0x1f}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) openat(r1, &(0x7f0000000100)='./file1\x00', 0x100, 0x4) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:36:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 01:36:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) 01:36:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 01:36:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 01:36:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 01:36:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a000000) 01:36:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000700000000000800000000000000000000000000000000000040000000000000000000000200000000000000000000380002000000000000914704cd70cfbae1dfa10036b708e98991ae56fe1df2253b9dfc32a43aa0ce965d4e804b6ea5cedabd20d507aae26db7352b"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='auxv\x00') r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)=0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)=0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000980)=ANY=[@ANYBLOB="7472616e733d7463702c706f72863d3078303030303030303030303030346532302c756e616d653d7b2c76657273696f6e3d3970323030302c6f626a5f747970653d7b7b5e242c7569643e906bbd76efd5da0d988de98657ec4f3f2219a9d02d9ccec17f83c0bb7ab377c0e466263137fbe9dbc266c6cc1a690e74dc4e4b1b4f05e84a79c526012271fc3632178e3f83406254f48ae5dbc4dab7432f4f0638b5fcfb3d6aa8", @ANYRESDEC=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r6, @ANYBLOB="2c687973782c3065726d69745f646972656374696f2c61707072616973652c61707072616973652c6f0b5b4b568a6c47e3f4f156b258a15faf198ecd636ccd118ff2908eb6dec3d0066da8250403002adc7c85710a89a43ff6dc4ccde43d88ad566b74802839970900961c57c8ed3e930c72d9520e06e2305700000000000000000000000000000045d3b9639f4a6c42af4e8b5c42011dfe95cfd4c1b17e253f0459bad51c1c2896d2ff2f8c218e5fd4d48bb980968c7bcb0900e68362b38cb0b0513627319f50a6"]) r7 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r7}, &(0x7f0000000040)) sendmsg$nl_generic(r2, &(0x7f0000000780)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc1425c9879bd88a0}, 0xc, &(0x7f0000000740)={&(0x7f0000000240)={0x4d0, 0x29, 0x300, 0x70bd27, 0x25dfdbfb, {0x15}, [@generic="8fdd1af8ac773e8950c12a1dc4d24879a20fede743673902f5361a9f8488da8c908e991f8117ae0babbd24ddf4bf5557949840cdbdf07e9c08849878d0bd95891fb841fd5ccbfad1a7da258a130a79f384f73134dacd2224f6e3761dfbac2c6b08f294c599", @generic="79fd6d0f107b575014f0438606962fcd568d8d7c58ded35ed97114bf72ffc643f698b1aad120de6c65c8a14b305dd82ed4f4285692dc641b855b", @typed={0x8, 0x88, 0x0, 0x0, @fd=r3}, @nested={0x21a, 0x57, 0x0, 0x1, [@generic="5d8ad76e62bd9405fa20053cbb3ed98bf9f50061d76e13ebf6aa0cade14e2119388d7ca4d0aadb6471da01a20ea0eccce41c32aa7804b7494e993db479beb27ec9c17453016437", @typed={0xc, 0x84, 0x0, 0x0, @u64=0xfffffffffffffff9}, @generic="7c9cf773a085fc078d6cf45572e3aebc632cf6141eefbba9087f4c78d0b0f197b6ed8b3a272249dcbba7479b53d2999695c0d05333f875876fe2db9894f56d4d8881830e90b0bfc6e90057a6c65d6269ca5c5e30dcc03c2f0e9d254583de296091d965", @typed={0x6, 0x2d, 0x0, 0x0, @str='-\x00'}, @typed={0x8, 0x5, 0x0, 0x0, @pid=r1}, @generic="7d00e65fa58e03b062d2d600c837b958639fcba884ba66eac8fe66c1358d52deb2b5f95bc4c41551fd9f7820e8d0ca1cd52cc5e680537cda3496dd0c3e3f2c465ebd996f40717fae1d08ae6ce47d1b92199902bfc24332bc2f11df66ba96e3", @generic="bcbb2dfa892b99450b8ec3dc22098aa81d033eeb19d58ef8ce693ad341e8534bbfde50d1232976d5af70f6c49c820bb6f855d9cfccdc40cf7092101d85e216b3d201d6d189fa7ef198aff0e2f267b0af3c51632d0c27f7dcf7172c83036d5837b78604e3e41eaff2a325922b77aa85ade4876f914ba80bcd975dd7f537ba92a06e83afcee4e042ca9447bdac5007fa38e5a633beb32bba272ba6d1aba2d198d8477aae7c3a7c", @typed={0xe, 0x96, 0x0, 0x0, @str='-\\++\\&-\xd0+\x00'}, @generic="bdb0a93f04a5b6dcc26d7bd7e8ba5fdd97199c42e3ac5d8e769fb1ca6ebdb51966745cf6b9ead043c972a07c3f39118eac7b5e", @typed={0x8, 0x4d, 0x0, 0x0, @pid=r4}]}, @typed={0x8, 0x54, 0x0, 0x0, @u32=0xc31}, @nested={0x1ef, 0x5d, 0x0, 0x1, [@generic="925dc6b3d06eebe1bc3c772c4f2f5a1a6b1c4f6f0f3d743da31779b257466914e701ab7e08b1b230d790104dabbe9d8c9fd8a268608116239329229ab8e39eda20c7362cf5779e1fec871881fdb7060b711e754784d16c7cf2b7909a68f84e968bb840ca5374fb0d5a241c581a85ac306c3ce8fc05bb005806884ba7174ef870b10e2863ceebfc5bfc05e7303e4b99c0e197097e6f1c361ad14f3595a1ee1091e5dd71fa607695e82d477b9e0cb14b67175c0bcc98", @typed={0x8, 0x15, 0x0, 0x0, @pid=r5}, @typed={0x8, 0x15, 0x0, 0x0, @uid=r6}, @typed={0x8, 0x5f, 0x0, 0x0, @pid=r7}, @typed={0x42, 0x11, 0x0, 0x0, @binary="60f69f0e97bea1df92c633bae6213b7e284b0da58dde8e1482e525932bc2b2a95a63494e71ef0f4858998108efca8c83c335dca04e560299c8dbd23680e4"}, @typed={0x8, 0x19, 0x0, 0x0, @u32=0x1}, @generic="47b8a0e419983fc933442aad950865de231a680c34affdc925147c7df24cd162d920d1a5d510fc17719d23566aec207af9610c617b827b5d743b317f67f0447c0e9f98464be1d5178f24438f6e273df0ecbf2a69e9a792e9c5a3951e7e42f060003889cf5f1bc9d41820ef8a92d343bda94eb969cbf39013e509dd6c4f46ab0045e1418fa5237588175b3c80f0728496fe538bd1b3694b2c23136ea5ea78e96c67e21c462b50913ef61f", @typed={0xc, 0x8b, 0x0, 0x0, @u64=0x1}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@empty}, @typed={0x14, 0xa, 0x0, 0x0, @ipv6=@empty}]}, @generic="9f"]}, 0x4d0}, 0x1, 0x0, 0x0, 0x40000}, 0x800) 01:36:50 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r1) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:36:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 01:36:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) 01:37:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 01:37:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) 01:37:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 01:37:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) lseek(r0, 0x40000000000, 0x1) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x4000, 0x10) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 01:37:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 01:37:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x80049367, &(0x7f00000000c0)=0xfffffffffffffffb) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f00000000) 01:37:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) 01:37:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) 01:37:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 01:37:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7ff39d83bc908948e4aa38cb49454c4600000007000000000000000003003e0000000000000000000000000040000000000000e053006902000000000000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r1, 0xffff) clone3(&(0x7f00000000c0)={0x16210000, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff7f, {r1}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48000000) 01:37:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 01:37:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 01:37:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 01:37:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20d315) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000100)={0x5, 0x0, &(0x7f00000000c0)=[r3, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0]}, 0x6) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f000004b400)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000004c400)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c600)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5, r6}], 0x3f, "373e2385af4599"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1936.190717] audit: type=1400 audit(1722130637.983:12): avc: denied { write } for pid=83939 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 01:37:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000) 01:37:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c000000) 01:37:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 01:37:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) close(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x8000, 0xa8) 01:37:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 01:37:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0020000) 01:37:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x5, 0x59, 0x5, 0x8}, {0xfffa, 0xff, 0x7, 0x1}, {0x40, 0x0, 0x7f, 0x7f}]}) tee(r1, r2, 0x2, 0x7) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 01:37:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68000000) 01:37:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a0000) 01:37:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c000000) 01:37:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000001e00000003"], 0xaf2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x19, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000200)={0x2946, 0x38, '\x00', 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r2, 0xffff) openat(r2, &(0x7f00000000c0)='./file1\x00', 0x400a00, 0x113) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 01:37:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 01:37:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f634c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000fbc3e29a63d0df28d7b661e880e0d21eb348e7a014911771b7c70ae7667acb326d8b1122c483625007c8ae07f6bc21c8426b17485ecee6df9d557438aa2c98c6ecbb"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31b, 0x0, @perf_config_ext={0x2, 0x4}, 0x800, 0x0, 0x100, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000180)) pidfd_getfd(r0, r0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 01:37:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r3+10000000}}, 0xfffffffc) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x3, 0x4004, @fd=r4, 0x0, &(0x7f00000000c0)="3e6129add6c32d45c9da4499584c4f4959e4c605425433d150e0802b80a077b754187bd840470812ff5f82600930056effff96116eb51093ef542b8dfbaa8baedc652ef91cb11b660c0e563791d2c862b49fbf", 0x53, 0x2, 0x0, {0x0, r5}}, 0x8) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20d315) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r2) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4640d20420dd0f00000000000002000300ff0f0000c3030000000000004000000000000000fb010000000000000000010009003800010081007f00040001000000010000000300000000000000000400000000000003000000000000001807000000000000fbffffffffffffff00040000000000003ad91f288c439b3d8a115478ec0fbc5e4c8698357dfc71061a477ce80acbf88245279a454a19b8a9a7ea32602e89394cd46bcd5e6db93768145a9c57ae1485748ef630f88da2fb0852d14ff40baaa0e9d83d50bcdc1ce1ddea99f6cfe45180137a3f139d6880e6025cf6ce727139ec58e47f2d8b43f3f3252c2667e8286f958d6f4b3a61018a45d2cfefea87250267bbf67fecc120f1c542838f40b77b5a51422d2ea35f7f49f8faf28deeb3f601c15252d94cffa4eb1a67dc61b17bb5aeef4e2e6ca2ecdcbf9c0f396903a0bb0d93e0ba26af4c86b7290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e00"/1615], 0x64f) 01:37:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 01:37:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 01:37:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f51010000000000) 01:37:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) 01:37:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r2, 0xffff) openat2(r2, &(0x7f0000000100)='./file1\x00', &(0x7f0000000200)={0x101200, 0x128, 0x4}, 0x18) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r3, 0xffff) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0xd84}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {r4}}, './file1\x00'}) r6 = syz_open_dev$char_usb(0xc, 0xb4, 0x4) sendfile(r5, r6, &(0x7f0000000280)=0x401, 0x18000000000000) 01:37:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040000000000000040000005c721b9f0000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file1\x00', 0x8) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f00000001c0)='async\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000000c0)=',(-\x00', &(0x7f0000000100)='./file1\x00', r1) 01:37:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a000000) 01:37:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff) 01:37:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) write$binfmt_elf64(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0xfd, 0x1, 0x48, 0x6, 0x3, 0x6, 0x9, 0x244, 0x40, 0x108, 0x0, 0xa42, 0x38, 0x2, 0x0, 0x5, 0x6}, [{0x6, 0x1, 0x40e, 0xb2a0, 0x4, 0x0, 0x2, 0x9}], "de7320db8a7a5ccb9dab5aa56d7cea0a6d24b7dd9ef11f8b06e4af933202dfd7f85c20a29669033592e109b8", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9a4) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 01:37:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 01:37:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 01:37:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3942, &(0x7f00000001c0)={0x0, 0xce07, 0x2, 0x3, 0xa9, 0x0, r0}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f00000002c0)) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r5+10000000}}, 0xfffffffc) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r6, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r1, r4, &(0x7f0000000300)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0x420}}, 0xfff) r7 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0xfffffffc, 0x14, 0x0, 0x0, 0x8f6, 0x4, 0x0, 0x1}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000340)={0x2, 0x1, 0x5}) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0x20d315) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x3, 0x62, 0x7, 0x0, 0x0, 0x3, 0x200, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0xfffffffffffff572, 0x8}, 0x102, 0x6, 0x8, 0xc, 0x80000001, 0xfff, 0x40, 0x0, 0x197, 0x0, 0x10001}, r7, 0xc, r8, 0x2) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff) 01:37:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0c454c463704f4e5000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000500), 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000007240)={0x0, 0x1, 0x0, 0x54, 0x1f}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) copy_file_range(r2, &(0x7f0000001d00)=0x2, r0, &(0x7f0000002200)=0x7fff, 0x2a22, 0x0) r3 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000100)=0x0) recvmmsg$unix(r0, &(0x7f0000005980)=[{{&(0x7f0000000180), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000200)=""/178, 0xb2}, {&(0x7f00000002c0)=""/96, 0x60}, {&(0x7f0000000340)=""/162, 0xa2}, {&(0x7f0000000400)=""/169, 0xa9}, {&(0x7f0000001cc0)=""/50, 0x32}, {&(0x7f0000007440)=""/102400, 0x19000}, {&(0x7f0000000540)=""/28, 0x1c}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000580)=""/7, 0x7}, {&(0x7f00000005c0)=""/9, 0x9}], 0xa, &(0x7f00000006c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x138}}, {{&(0x7f0000000800)=@abs, 0x6e, &(0x7f0000000880)=[{&(0x7f0000001940)=""/217, 0xd9}, {&(0x7f0000001a40)=""/145, 0x91}, {&(0x7f0000001b00)=""/243, 0xf3}], 0x3, &(0x7f0000007280)=ANY=[@ANYBLOB="c5ad0eeccc00028100fb000000bbd80000009b6107c557ce0e47d895fd58737d34ccd3d4bb51a2020000006105f766a44ca384c31bc3692b606f7c1f2fdb45431623c5f1b02990c987ea7ee34444afc7fa57af22312bb91027d60431696110bbb2dd831444c9a8", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x138}}, {{&(0x7f0000001d40), 0x6e, &(0x7f00000033c0)=[{&(0x7f0000001dc0)=""/235, 0xeb}, {&(0x7f0000001ec0)=""/68, 0x44}, {&(0x7f0000001f40)=""/182, 0xb6}, {&(0x7f0000002000)=""/197, 0xc5}, {&(0x7f0000002100)=""/251, 0xfb}, {&(0x7f0000001c00)=""/170, 0xaa}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/238, 0xee}], 0x8, &(0x7f0000003440)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}}, {{&(0x7f0000003480), 0x6e, &(0x7f0000004a00)=[{&(0x7f0000003500)=""/239, 0xef}, {&(0x7f0000003600)=""/78, 0x4e}, {&(0x7f0000003680)=""/47, 0x2f}, {&(0x7f00000036c0)=""/106, 0x6a}, {&(0x7f0000003740)=""/100, 0x64}, {&(0x7f00000037c0)=""/231, 0xe7}, {&(0x7f00000038c0)=""/17, 0x11}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/245, 0xf5}], 0x9, &(0x7f0000004ac0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x120}}, {{&(0x7f0000004c00), 0x6e, &(0x7f0000005100)=[{&(0x7f0000004c80)=""/93, 0x5d}, {&(0x7f0000004d00)=""/158, 0x9e}, {&(0x7f0000004dc0)=""/150, 0x96}, {&(0x7f0000004e80)=""/26, 0x1a}, {&(0x7f0000004ec0)=""/38, 0x26}, {&(0x7f0000004f00)=""/220, 0xdc}, {&(0x7f0000020440)=""/254, 0xfe}], 0x7}}, {{&(0x7f0000005180)=@abs, 0x6e, &(0x7f00000052c0)=[{&(0x7f0000005200)=""/182, 0xb6}], 0x1, &(0x7f0000005300)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x158}}, {{&(0x7f0000005480), 0x6e, &(0x7f00000056c0)=[{&(0x7f0000005500)=""/148, 0x94}, {&(0x7f00000055c0)=""/204, 0xcc}], 0x2, &(0x7f0000005700)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000005780)=@abs, 0x6e, &(0x7f0000005940)=[{&(0x7f0000005800)=""/130, 0x82}, {&(0x7f00000058c0)=""/97, 0x61}], 0x2}}], 0x8, 0x0, &(0x7f0000005b80)={0x77359400}) r6 = gettid() r7 = perf_event_open(&(0x7f0000005000)={0x4, 0x80, 0x81, 0x0, 0x1, 0x8, 0x0, 0x9, 0x20100, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000002240), 0x1dcf2208155dbceb}, 0x42840, 0x8, 0x5, 0x1, 0x836ded3, 0x2, 0x3, 0x0, 0x5, 0x0, 0x3f}, r3, 0xb, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r7, 0x40e, &(0x7f0000002280)) timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r6}, &(0x7f0000000040)) sendmsg$nl_generic(r0, &(0x7f0000007200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000071c0)={&(0x7f0000005bc0)={0x15c4, 0x32, 0x300, 0x70bd26, 0x25dfdbfc, {0xd}, [@nested={0xa5, 0x86, 0x0, 0x1, [@typed={0x8, 0x3a, 0x0, 0x0, @pid=r3}, @generic="eae7689f29c2e2fdb01f022e6b2ca909665ac06e184244b13024e35375dc1bd764162499dd25415394e81ae83a209d5c931025ef7c1fb28a751b3d6c794cd1043918b0aab2bf67243d51ab308a87d6d90aad443fbadeffaadf5d3c217805f8e29810471170a645f2b7a7c62490c67f44010ca39511de9cf4d537258ad82c82ba3a7e618c056a236be4051f0de2b317a04667fd2c549d4181a0"]}, @generic="61713ed6305d5f10ab42b4d84638081d762cf78863f98441cddafa61680c70d92211bc28239cd977a4578fbae81d58a16504a82fd23500b1140f5ca5a9db1d23e87b027dc73c100805a288cc3cb98604", @nested={0x103, 0x8d, 0x0, 0x1, [@generic="a30c1e61bb7e62bcaca4cd589fe5396906c00682ce6e96a5ea6bf08a700f7c0fe73d05954b621da3137c1324d907db443cf6bdeef5175f0bb04fdc095e7b4e94b46c8e286db5d4a851cc277a387c12fa8e418f3d1c81777e90915cbd9875fbd7c8517392cbb76fbe627e43e77d93fd51b2297cae9199d11ed4cda70a2aea24e33480aa6795ce2e4ef8b400bb26ba30fec834fbaf372cc00d3b23ae9f7b3d68d2c912cc0dc1d221d9b51537d7e6c3ccb547c9d246838e93f61ffdbb81379672da67a40af4cccda4ed0a4907ecc33c73e93408393d772d751870381b0c7b379f8e5dd19bf2d173c4c63d8dc1ae376959b207db68", @typed={0x8, 0x1b, 0x0, 0x0, @uid}, @typed={0x4, 0x11}]}, @typed={0x14, 0x60, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @typed={0x4, 0x43}, @generic="eafe8d60203a87c2ec71a42dd4590b03375ba92130796d0de007de59d3d22761e5e1bc6bdb7a258421a041738e0cdc9ba46704725bdaec8c258701a72f730c61e6732dcd01e0c4b632af4315203cf244d25e03d2dd3d77babeaa6dab3f75d76427aa4b993834c8e8d772cca247ecf0266ef259a0ebd6ba0611dcb7b5c0163423e544ba40ab6a56caa0049d65ef7229febb03a1e6e90c006f63b5cca63ddd24e8c74b16b7c373bbd9ba7b8394a400129b4481427572e15acea019647e0f6157b3155979583cd9032e", @nested={0x38, 0x44, 0x0, 0x1, [@typed={0x4, 0x5c}, @typed={0xc, 0x3b, 0x0, 0x0, @u64=0x5}, @typed={0x8, 0x5, 0x0, 0x0, @uid=r4}, @typed={0x14, 0x49, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x8, 0x96, 0x0, 0x0, @pid=r5}]}, @nested={0x1299, 0x29, 0x0, 0x1, [@generic="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", @typed={0x8, 0x38, 0x0, 0x0, @pid=r6}, @typed={0x14, 0x5d, 0x0, 0x0, @ipv6=@local}, @typed={0x1004, 0x4c, 0x0, 0x0, @binary="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"}, @generic="a55f409aa3689111024696dd737fb60e934243e3e15fbbd10c75f1dd01720bae1be922b7c578a52f2f25647838752e5c41f07c487f8334df4a252dd8be094e08427888af76e1619be65757cf970536de0603fcda4f9f2128c08709c89b78e9927babb22a10902b01a2a7708befdbd925335608", @generic="d28f4a386d9bb205d7de77989e0f83831ec9dc292732f15652d65c23c534c4d3faf2a102c320e0bf613a00bbf6a4113f03ff83151b7ad75f5a14952e630fb9d1ea2fb98e3c7ba53484ce1a827d37da0cb350d0c32d0dfafd9e024c0441a3e28c6d78ace1c4130f1d90843c9b42ee355f55", @generic="cdd552cdde4344d1bd73310a0c8dc979da66786983bc7bf241e6cd9f49d7dc0f5988b9e42dc4b03124f0252298cb761f5838b9bf53aae356f1519b9ec9dcc17d192d058936a5beac046c04c717522be5ba62752000dd1d14c826b8781a7fdd1acbd0f83b1919921b38c9fe11a7181dbd8a6dc4ee0bd1a21d0ef812e63117b24aac5487e0487ee14be61d76f68686cfc9d02c"]}]}, 0x15c4}, 0x1, 0x0, 0x0, 0x51}, 0x8c0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 01:37:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f510100) 01:37:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 01:37:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 01:37:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, 0x0) write(r0, &(0x7f0000000240)="01", 0x1) r1 = openat(r0, &(0x7f0000000040)='./file1\x00', 0x42, 0x1e8) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) syz_open_dev$ptys(0xc, 0x3, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) close(r2) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) 01:37:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x2}}, './file1\x00'}) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000100)={0x10000, 0xe303, 0xffffffff, 0x8001, 0x3}) 01:37:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) fallocate(r0, 0x18, 0xfffffffffffff034, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:37:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f) 01:37:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 01:37:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 01:37:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 01:38:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 01:38:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 01:38:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) 01:38:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 01:38:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000000000", @ANYRES32=r0, @ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00./file1\x00']) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) 01:38:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000001c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000940)={r2, r3, "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", "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"}) 01:38:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000007000000000063000003003e0000000000000000000000000040000000000000000000000200000000000000000000380002000000000000000349b7d7f497b9622834ac42661fac42388c3c6e0d9baaed1928df0530f604204222c080b4e3c6585517ff4c1c2465fc221dd319bca6dfdb66d93945b470cddde3660e17aa0e0625d7333bfd0242469095304b0f8cd0956e9b8f0e6458d0"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) dup2(r1, r0) 01:38:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a000000000000) 01:38:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x81, 0x5, 0x1f, 0x0, 0x7fffffff, 0x4, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x5, 0x100000001}, 0x1, 0x7fffffff, 0x5, 0x5, 0x7f, 0x80000000, 0x40, 0x0, 0x3f, 0x0, 0xb6a}, r1, 0x8, r0, 0x8) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 01:38:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20d315) r2 = openat(r1, &(0x7f0000000040)='./file1\x00', 0x282242, 0xd0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e060000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000840), 0x10c200, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f00000000c0)=0x44, &(0x7f0000000100)=0x4) sendmsg$IPSET_CMD_PROTOCOL(r3, &(0x7f0000000a00)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x4c, 0x1, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x4000881) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000000c0)={0x1040900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 01:38:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 01:38:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) 01:38:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0020000) 01:38:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000030000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x1c1) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) pidfd_getfd(r1, r2, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x22002, 0x1c) 01:38:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffb) 01:38:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 01:38:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000f1a3996bef7c56020000000000003800020000000000000003"], 0xaf2) close(0xffffffffffffffff) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 01:38:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000000000000000000000380002000000000000000300"/65], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a0000) 01:38:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 01:38:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffe) 01:38:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000007f000000000000004000000000000000000000020000000000"], 0xaf2) readv(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000002940)=""/4097, 0x1001}, {&(0x7f0000000400)=""/230, 0xe6}, {&(0x7f0000000280)=""/60, 0x3c}, {&(0x7f00000002c0)=""/138, 0x8a}], 0x5) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = getpid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000100)={0x0, 0x10d109d6, 0x4d, &(0x7f0000000500)="e27a7b2ab3db4af9798039d48c90505f0631155cbfb53db3f651cc69e4e10055b589f2d71804b7f95f5c060fb4e69b232dd422c39abfb81518c7b99c3d9fdb5fa69049b3e5b4416dc024a93570"}) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x1f, 0x3, 0x7, 0x6, 0x0, 0x6, 0x2230, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xc45, 0x2, @perf_config_ext={0x80000001, 0x2}, 0x40000, 0x4, 0x3, 0x3, 0x0, 0xf5bf, 0x1, 0x0, 0x8, 0x0, 0x987}, r1, 0xc, r2, 0x1) 01:38:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 01:38:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 01:38:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000ed280e3e09528c4e3aa7045073c4ae4739e5fa574c100200655a6b912358d797bbe3055b05a2d5f54f1da417e3ffa01525a82640211c35057932effc8d7e8755181b430671906bf7abae1aceeb772534635b520f7de9fbe713640070d124a73dedd814aedf0269feaa3e9218120a252d1161921580364b2ffcd93f29bfc4e2ba847aba4708400caa34e0b3"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x2000, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000001c0)={0x1e, 0x3, 0x13, 0x1, 0x8, 0x9, 0x0, 0x155}) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000fb00000000fb2000161b1521363d92eb0024a31a8defceb1daa656aab268e40a591e2ff7"], 0x80440) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20d315) bind$bt_hci(r3, &(0x7f0000000180)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r5 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20d315) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x79, 0x0, 0x3, 0x2, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80, 0x2, @perf_bp={&(0x7f0000000140)}, 0x14824, 0x9, 0x0, 0x2, 0xe8, 0x6, 0x3, 0x0, 0x2, 0x0, 0x8}, r5, 0xe, r6, 0x1) 01:38:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 01:38:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x5, 0x5, 0x7f, 0x400, 0x3, 0x3e, 0x9, 0x3d7, 0x40, 0x15a, 0x4, 0x9, 0x38, 0x1, 0x5, 0x5, 0x2}, [{0x3, 0x1f, 0x0, 0x7, 0x9, 0x2b, 0x1000, 0x3}, {0x6474e551, 0x800, 0x35a, 0x8, 0xffff, 0x7fffffff, 0x8, 0x2}], "0a8f9223b41031d36d9286f8830302fde528049d7f2c9f934d80cb75f2891ec4e79aef23f91471bd8c48782389e6b4e9bbf852736d98c9407b419ed8fbcdc53fd80fa2686fa862f5496f8d69cd48091d54576a58c970eb28f124a1c41f175434963cb44f931ea0b77e0fdbb7db25da45592b8d926ee306cab256589700013cc7bad4bc4232327d81173d8ec6650a9d9fa77be13ba6c15d9a5807978833a56d86cdcdaffaa5a501b5cc89f5b82088afbcddfdf38a5887e81f4c4f4c22a7ae5813668b573c8bdeb8230b3c59d8ae88a3a527d92acd0950c5e48d", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x689) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000001a80)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file1\x00'}) sendfile(r3, r4, 0x0, 0x20d315) sendmsg$nl_generic(r4, &(0x7f0000001a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001a00)={&(0x7f00000009c0)={0x101c, 0x2e, 0x20c, 0x70bd29, 0x25dfdbff, {0x3}, [@typed={0x8, 0x62, 0x0, 0x0, @ipv4=@multicast2}, @generic="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"]}, 0x101c}, 0x1, 0x0, 0x0, 0x10}, 0x8012) r5 = openat$incfs(r1, &(0x7f0000000880)='.log\x00', 0x210000, 0x1a) ioctl$sock_ifreq(r5, 0x8921, &(0x7f0000000940)={'batadv_slave_1\x00', @ifru_hwaddr}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2, 0x2, 0x8, 0x6b, 0x0, 0x7ff, 0x802, 0xe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x81, 0x1, @perf_config_ext={0x3, 0xffff}, 0x4020, 0x1, 0x3, 0x5, 0x0, 0x7, 0x9, 0x0, 0xfff, 0x0, 0x7}, r2, 0xb, r5, 0x2) 01:38:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000007fd0000000000000003008a2975c01448bbd8e165473e000000000000000000000000004000000000000000000044e3c5b5000000"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r1, 0xf503, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 01:38:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f51010000000000) 01:38:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) 01:38:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 01:38:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 01:38:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040000000000000000000000200000000000000000000380002000000000000000347514885a67c8099a73fb66f61b266db2a133c30a350f98973e7daf8e656c73189862a6e9573ed95f89c0306635b29bfa99fc10afd8e461af8e8115df2e901701150574922b50d1643fc7934933626ea383b6c224d86917b114fe81359a6b601563372c8e6d5c5a9a2ea0849232285dbc1e28546990645f9cff046645f8941fcd86f8a3d37aa001011a646b18ec28e883564739de948ea4d07efe9d3af53069affb60698c28c148b03f65e2836af6636793ad543e44e72177385e07484bbcae03dd0693a41a6c4b77e86294008dfebdf546e011d929679f4c195c82e775d6f9da1cb73"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) 01:38:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) syz_io_uring_setup(0x796b, &(0x7f00000000c0)={0x0, 0xc721, 0x8, 0x2, 0x3e1, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000200)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000480)=@IORING_OP_WRITEV={0x2, 0x2, 0x4007, @fd_index=0x2, 0x9, &(0x7f0000000440)=[{&(0x7f0000000240)="b4c57a596853a54691a4ca84d94c78dc014d5878504ec9867d31d5994d54731a502a6e8e8691ca6425e8c2a61d794c666e0d34c0cc773a1b6b329af0ece3054937558d914b2809983ce9850b53de41c69c16ee62718f38c4f7028e95cc1d1e72a22c75c8e910210615e27fb8ed979babc881349f33b0a38c2711c20b1c8fd140bb27ee52f09dacef1c97ea839f0f45bd83f6e85a6ef6e9ac", 0x98}, {&(0x7f0000000300)="d07b8e0a4e88f74ee14340ee8cb0d84421d28fc06033784cde63d5a281a49f82e8fc2965c0dfcfec197cc155f1b0db038a0ec7d75e3d6d1490650ce672df646dfbff6e96892edcd1babcf8da425c4c8673e2213ad19bdd1b7f74803a465abd585f65108cadca593ae21889dad46f980812e5d66680f8e666faea5fd5cfde6123b99bbeecad3daa702619a0536cc46841713d8d802cb1b16f4c2d9cb0f7f190aee135519ed4550ea443fd17ecfa12164d172fecfa29040f3697fc83c9", 0xbc}, {&(0x7f00000003c0)="7755a348bf3f270c94f74f25ad599242a0ecaa4ed9eb62e2a5fbd01625656cab93b3b6", 0x23}, {&(0x7f0000000400)="3eaeb1eb73820da22c714d720087b500e174140dc48f346c1f15d8a7744c39731cc8163807c001f5c19ea8446d1016d3cd8a721b91a72fa39dfb", 0x3a}], 0x4, 0x10, 0x1, {0x2, r2}}, 0x3) 01:38:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x80000, 0x100) clone3(&(0x7f00000008c0)={0x20124d100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x2, 0x96, 0x5, 0x0, 0x0, 0x800, 0x12000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x2, 0x7}, 0x100, 0x3, 0x7, 0x3, 0xffffffffffffffc0, 0x1, 0x4, 0x0, 0x10000, 0x0, 0xfff}, r1, 0xf, 0xffffffffffffffff, 0x9) 01:38:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000007c2c3df7408c23fd000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 01:38:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff) 01:38:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20d315) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x18, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r2, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xfffffffd}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x129}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x44000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x20d315) openat(r6, &(0x7f00000000c0)='./file1\x00', 0x101080, 0x40) write$binfmt_elf64(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000003c88b2079d31e5700486def984b103d91cc3ff26932a720105bb88a746eb2870b450c17d9a3641afe155b0fdbb7ac72bd6caf7b1a694201516b0917f74bcd611ab5708619f54017011be9a68149de2f16b035b6d0eec13b01447ccc43bb3d54762e991782166ee4b2c1c90198"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) dup2(r1, r2) 01:38:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 01:38:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x18881, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r1, 0x80605414, &(0x7f00000001c0)) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000100)='./file1\x00', &(0x7f00000002c0)=[&(0x7f0000000240)='/dev/hpet\x00', &(0x7f0000000280)='/dev/hpet\x00'], &(0x7f0000000580)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='/dev/hpet\x00', &(0x7f0000000380)='/dev/hpet\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='/dev/hpet\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='/dev/hpet\x00', &(0x7f00000004c0)='/\xf8\x00', &(0x7f0000000500)=')&\xab-\'-,)\x00', &(0x7f0000000540)='-]]!({\\*%!+/\x00'], 0x800) 01:38:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x69d2, 0xfffffff7, 0x80, 0x3, 0xffffff87}) 01:38:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f00000000) 01:38:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff) 01:38:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 01:38:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 01:38:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) pipe2(&(0x7f0000000500), 0x4000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000240)={0x7, 0x1b, 0x1000, 0xa865, "821e53eaff7c2a6a027ea39f3ca889dda418eddb2685da55cc75a8f1d7bffee1"}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x800, 0x781242) fgetxattr(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="6f7302309b751868a0a50c97a052a2f9006ffbc27bb9632d0ab05f64a5144d556b244051d54b70c29651b3c3ed45cb4775880614763d36441fb2795ec711024e6240d1a35c9743a1246cae809f3d8a3739d3e9508522cad0fe6c53294a30f9827bbb448cf54cab6c565c8034d5bfb71b261d31d3fce591341497229e7fa78ba162553043e2742a4446a33819b4a611bbf0983c68f17efba3efe05f4a8b897159c129a127b39f68f9eff8b63309c9f334c0c94fabec8116704afd389b005574dadfb3ac20e292b5d4717031b0d2888ac143d844f3ed3ea90d236f28ec888635257c502ba955a75732d8d9dc9748c584d85bbd7616e006fe290143cdb62c1d32ced7857d1e3b701d7a669d47503cc28ffbf7d4a1add54e5093177566377f6fc83dbe4fe6ac5b7f21ef7aa53c3f566f1ac36518701d387e77ddc7c90f0347496d2228eadad5809020fd950b8d0d4c383ab382e9c3e4"], &(0x7f0000000180)=""/158, 0x9e) r4 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r4}, &(0x7f0000000040)) clone3(&(0x7f0000000480)={0x20080200, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0, {0x31}, &(0x7f0000000340)=""/11, 0xb, &(0x7f0000000380)=""/138, &(0x7f0000000440)=[r2, r2], 0x2, {r3}}, 0x58) r6 = socket$packet(0x11, 0x3, 0x300) kcmp(r4, r5, 0x5, r6, r1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f) 01:38:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000200000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xe, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 01:38:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 01:38:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 01:38:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 01:38:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 01:38:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000000000000000000040000000000000000000000200000000000000000000d22a0200000000000000032e4bbf9c56db0a9ff90fefd170b10c7d1b4415b3ea9f58a64615c93da9f5ae89399fdb65d5821c5d272ae1b674da44761b8389fab77be744e7bb0897072f615f7ea78628768919cd486737c8306b19fd3931e9c7b69541483404005f5837f50fae830ad5dbaa846414ef433d59bde8604268d2733200000000de421e837d0c304d7d186be7bae77b9d1a290f18fbdbc548"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:38:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) 01:38:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 01:38:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 01:38:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000000700000000fa36fbe8c5cf87cb010e86c18bfbea15d288b7c6d93446a280003b40f995ed3087db0acc4000000000000000000000020000000000"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$RTC_UIE_ON(r1, 0x7003) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000100)={0xfffffffe, 0x0, 0x16, 0x8001c, 0x2, 0x8f2}) ioctl$RTC_WIE_ON(r1, 0x700f) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000008, 0x110, r2, 0xb116f000) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a000000000000) 01:39:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) close_range(r1, r2, 0x0) 01:39:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 01:39:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 01:39:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 01:39:09 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0x10000000}) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x16, 0x0, 0x0, @u64=0x7}]}]}, 0x2c}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600e56556d6a685ee000007000000000000000003003e000000000000000000000000004000000000000000000000020600000000000000000038000200da5aefe05303735a618a899031a38757d1dd90d317a377fe0fb54b1aac8e52878c66ca1e8c3714b1ef243e2a3c110537b817012d8e67ab852baa936c68113287fb2f6822"], 0xaf2) close(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x12040, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x61, 0x38, 0x63, 0x34, 0x30, 0x38, 0x64], 0x2d, [0x64, 0x65, 0x62, 0x33], 0x2d, [0x61, 0x34, 0x35, 0x30], 0x2d, [0x38, 0x65, 0x34, 0x64], 0x2d, [0x39, 0x33, 0x33, 0x32, 0x64, 0x68, 0x39, 0x35]}}}, {@smackfsroot}, {@subj_user={'subj_user', 0x3d, ',,,*)$'}}]}}) 01:39:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3800000000000000) 01:39:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="7f459125000067375a09c88e9e8a45f451881a400ae8000700000000910000000000000000402af2622dcc90041a999666f377bab7e6d096c196bf19d67d3fc62bd99776968e7ba7f65e2fee4aabf124c42cd146677f4b53fedd30657d5dbd5d6339f95eae00dfbd5bfa6c0fd912d1152f05a109c1146b89690e4689bb28b93c6c930b1c375c7ccdcf325f622d18ddf9d4b89b431dc1a6b16972174251834471a7b3d05ad1cdd2e4f78c87e29bba75b73ab97f04f015dcb0b256761ea8c6e3c3d8e33a186cc2984b06bec7d3b5af4b821e45d240534557859e2c3af5f70f74381c8e81bd3ca163606ea913675e3dd2e3c88691e38e5c"], 0xaf2) close(r0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r3+10000000}}, 0xfffffffc) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_WRITE={0x17, 0x5, 0x3003, @fd_index=0x3, 0x991, &(0x7f00000000c0)="b90cdb461df9b6129db72ef74f05f3fd5915225e8c410276b16985b8c1919d8cc9c34acbee240f432e49dad30b03d3cba366f991b0b39f9de64e9b75a7663d4eaef2bdd97674451d1bfe44a09d28a24fa439047e7b032a2ba29d8c232479c7e81811d3e9e48af53e87541362ba255f63cb43cb26cca1d0f779557861", 0x7c, 0x4, 0x1, {0x0, r4}}, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone3(&(0x7f0000000840)={0x438c0100, 0x0, 0x0, 0x0, {0x22}, 0x0, 0x0, 0x0, 0x0, 0x4d}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000240)=""/77, &(0x7f00000001c0)=0x4d) fallocate(r5, 0x24, 0x81, 0x6) io_pgetevents(0x0, 0x4, 0x5, &(0x7f0000000340)=[{}, {}, {}, {}, {}], &(0x7f0000000400), &(0x7f0000000480)={&(0x7f0000000440)={[0x10001]}, 0x8}) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x500, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000980)=ANY=[@ANYBLOB="7472616e733d7463702c706f72863d3078303030303030303030303030346532302c756e616d653d7b2c76657273696f6e3d3b70323030302c6f626a5f747970653d7b7b5e242c7569643e906bbd76efd5da0d988de98657ec4f3f2219a9d02d9ccec17f83c0bb7ab377c0e466263137fbe9dbc266c6cc1a690e74dc4e4b1b4f05e84a79c526012271fc3632178e3f83406254f48ae5dbc4dab7432f4f0638b5fcfb3d6aa8", @ANYRESDEC=r7, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r7, @ANYBLOB="2c687973782c3065726d69745f646972656374696f2c61707072616973652c61707072616973652c6f0b5b4b568a6c47e3f4f156b258a15faf198ecd636ccd118ff2908eb6dec3d0066da8250403002adc7c85710a89a43ff6dc4ccde43d88ad566b74802839970900961c57c8ed3e930c72d9520e06e2305700000000000000000000000000000045d3b9639f4a6c42af4e8b5c42011dfe95cfd4c1b17e253f0459bad51c1c2896d2ff2f8c218e5fd4d48bb980968c7bcb0900e68362b38cb0b0513627319f50a6"]) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) mount$9p_fd(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500), 0x80000, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}, {@fscache}, {@nodevmap}, {@noextend}, {@cache_mmap}, {@cache_none}], [{@euid_gt={'euid>', r7}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x32, 0x30, 0x32, 0x66, 0x64, 0x66, 0x31], 0x2d, [0x64, 0x35, 0x33], 0x2d, [0x39, 0x61, 0x66, 0x34], 0x2d, [0x35, 0x33, 0x62, 0x64], 0x2d, [0x31, 0x0, 0x36, 0x0, 0x30, 0x37, 0x34, 0x31]}}}, {@uid_gt={'uid>', r8}}, {@dont_hash}, {@obj_role={'obj_role', 0x3d, '-!^,{!#'}}, {@subj_user={'subj_user', 0x3d, '+$*%[}-\'+&$\xe4/6/'}}, {@fsname={'fsname', 0x3d, '^#('}}, {@dont_appraise}, {@dont_appraise}, {@fowner_eq}]}}) 01:39:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, &(0x7f0000000940)={{r2}, "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"}) r3 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0xc3) sendfile(r1, r3, 0x0, 0x20d315) write$P9_RREADLINK(r3, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffb) 01:39:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 01:39:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 01:39:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={r1, 0x7f, 0x8, 0xffffffffffffff00}) write$binfmt_elf64(r2, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x9, 0x81, 0xc0, 0x65b, 0x2, 0x3, 0x1, 0x2c8, 0x40, 0x3e, 0xfffffe99, 0xf1, 0x38, 0x1, 0xef, 0x5, 0x800}, [{0x6474e556, 0x5, 0x0, 0x6, 0x2, 0x8001, 0x4, 0x7}], "e2e65a4e2e7a3b3610fad051632878035e77dc02a96927775bbc9b47c8bb2534e6439bfa12dd5fb26c43127038a990493e8e6467b8b533a23df7b38aeebf411c67d4bb7e1c96943d5b799d5bae4bdc31ca2e96d47ad4d94e2a06e47ced2ab2e2e2b49e79b34ee386e4b839010996e97b26642e93fcc93683580abe44e18bc5e732a08c21c925a3e97ef7584a6700c931ba82fbd78bef20dc63c0be1f36667c226d110efb772e95b893a47afb4a069f17a189d40adc56b624713f54d9253107c910da843b7c93be66c5ed01f80bdd72c6be29bab667a96728166306403d936caed83b3a71e696a6b9ebf266b97466", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x866) 01:39:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000020000d00da941e100000000400000000000000000000002"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 01:39:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20d315) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x0, 0x42) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:23 executing program 1: ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000240)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = inotify_init1(0x800) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000001c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f00000014c0)=[{{&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0}}, {{&(0x7f0000000580)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000840)=[@pktinfo={{0x24, 0x29, 0x32, {@remote}}}], 0x28}}], 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000440)={0x0, 0x1, 0x1, [0x5, 0x8, 0x4, 0x401, 0x400], [0x3, 0x3, 0x749ea0de, 0x7, 0x1, 0xf80000, 0x3, 0x6da4, 0x1, 0x5dd5, 0x401, 0x3ff, 0xffff, 0x6, 0x8, 0x0, 0x6, 0x7137bb0f, 0x1, 0x3, 0x7, 0x1, 0xc5, 0xffffffff, 0x2e7f, 0x1, 0x8001, 0x40, 0x80, 0xb99f, 0x6b, 0x7, 0x7ff, 0x401, 0x0, 0xcde, 0x8001, 0x3, 0xeb, 0x80000001, 0xff, 0x5, 0x2, 0x6, 0x2aa3, 0x44, 0x10000, 0x7, 0x1, 0x86, 0x0, 0x5, 0x6, 0x6, 0x3, 0xffff, 0x800, 0xcd, 0x1, 0x0, 0x6, 0x7, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x5, 0x14000000000000, 0x3, 0x9, 0x3, 0x1f, 0x7fffffff, 0x1000, 0x3ff, 0x3, 0x9, 0x8001, 0x5, 0x8, 0xffffffff, 0x20, 0x11, 0x7ff, 0x1000, 0x4, 0x9, 0x6, 0x8, 0xe44f, 0x2, 0x4, 0x9, 0x7, 0x58a, 0x2, 0x401, 0x60, 0x7ff, 0x60298000000000, 0x5, 0xdd, 0x80000000, 0x7, 0x40, 0x1, 0x5, 0x7, 0xffff, 0x0, 0x2, 0x0, 0x9, 0x9, 0x80000001, 0x7f0c, 0x4, 0xe19, 0x5, 0x2, 0xfff]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000940)={{r1}, r2, 0x0, @inherit={0x60, &(0x7f00000003c0)={0x0, 0x3, 0xffffffffffff175f, 0x8af, {0x1, 0x8, 0x7, 0x0, 0x3ff}, [0x5, 0x100000001, 0x1]}}, @devid=r4}) write$binfmt_elf64(r0, &(0x7f0000001940)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000000038000200000000000000032fe4598e6a1a77b8e4c0e0a991e99e8e5a48589c406a7456e147571409755d49300f19401d1960d6e0d807451720971850fec0b762b6215f85c02a4be1a5e218ff7357fe4b89"], 0xaf2) close(r0) r5 = openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) fallocate(r5, 0x8, 0xce0, 0xff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000) 01:39:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46800000070000f4b3aa1c68b250a6e30000000000000040000000000000000000000200000000000000000000380002000000000000000300"/74], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept(r0, &(0x7f0000000140)=@can, &(0x7f00000001c0)=0x80) setsockopt$sock_int(r1, 0x1, 0x11, &(0x7f0000000200)=0x1ff, 0x4) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f3e0000000000000000000000000040220000000400000000000200000000000000000000380002"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f00000000c0)=0x4) execveat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0) 01:39:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffe) 01:39:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 01:39:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 01:39:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) write(r1, &(0x7f0000000940)="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", 0x1000) 01:39:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 01:39:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 01:39:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 01:39:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000000000000000020000000000000000000038000200000000000000030000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x10180, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7, 0x0, 0xdf, 0x5, 0x0, 0xffffffff, 0x0, 0xa, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3fc0, 0x2, @perf_config_ext={0xa5, 0x2}, 0x410, 0xa51c, 0x6cf, 0x9, 0x7, 0xe82, 0x4, 0x0, 0x3, 0x0, 0xc68}, 0xffffffffffffffff, 0xa, r1, 0x8) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c460000000040f27f25b4d11fd3b0cfc97903003e0000000000000000000000001f4000000000000000000000020000000000000000d899101c4cb466b2b97354b3d01dd8732e310f0022ba4c221b7a5256dda37becac5633f7ac92ed396086c7eaa07c28b68fbece7517f79450400eae13627680f0248949843c6a3c9604baa019f8fc396ba23ca108d51d7b14b0e6ed80d0c81312beb8b5b17b5b7c8be3f47253cf0d65d0793765f2e022d593e02c1c984d87347695531931c1d706256d582fc16e2d1db5d1d7a9646a5fc0175b20044fca7ce2c0601aafa13fcfb08b4016c9dff6a08eedcd026c92ec395f"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x143a, &(0x7f00000000c0)={0x0, 0xfcd3, 0x2, 0x1, 0x249, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000240)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x5) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000000307000000008000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:37 executing program 0: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="c4dc3718ac8bb5d52c7b2502beb57f5346460000003c0000000003003e00000000000000000000000000000013000400"], 0xaf2) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0xad9b746abe175a2f, 0x0, 0x10000, 0x9, r1}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x31}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x8f6}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r3+10000000}}, 0xfffffffc) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x64, 0x0, {0x0, r5}}, 0x3) ppoll(&(0x7f0000000100)=[{r2, 0x100}], 0x1, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0), 0x8) 01:39:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) 01:39:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) 01:39:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000f6060003003e000000000002000000000000020000000038b94dffffffffffa4dd030000000000aac800"/59], 0xaf2) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xc}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r1, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r2}}, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x1e, 0x4000000, 0x0, 0x400, 0x8, 0x8f6, 0x0, 0x0, 0x1}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd, 0x0, 0x0, 0x9, 0x9, 0x0, {0x0, r2, r3}}, 0x6) 01:39:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f00000000) 01:39:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000005002ca4c868d37830ed1453f16525000000000040000700000000000000000300"/65], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 01:39:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 01:39:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 01:39:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 01:39:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000400)={{'\x00', 0x1}, {0x800}, 0x1, 0x0, 0x0, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)="486189dace00821ad418f77994f44a983ac7a15555434830f652e4bb8cb801980096d2b4b90783e3b041e3afc5a9ca73b97f9e", 0x33, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000086000000010000000c17000000fa9dc44b938278677e2ed0cf3e123c652dcaae17d1048e6200000010e6bf6732b050d04c24ffff859221ac2990e962db9fdd65b82a72cb8b66df58ebde8880d5ea10857ff5dee2f274c1fbe8a51f43da625274b8021ae4ac47daa0c2f0a18abb2fb8821f2c8ba7d6c46bb64275444aa3027486887388591f09872b1c62280000004d0b28840371aa8256189b4fe6289b6d53473fe5d67fbd09828b1fc48fb089e7c7eb66554b7ff18f"], 0xba}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f00000005c0)=[{&(0x7f0000000480)="5dc5ca66a5ba1fb7b52ef629d216ad1699564018bc58933ee46e10a1249754620c059e379f449479507fa4ac6c50c163741e1ac771358048e6fac3ab2d35c852fe8cf90edef3f2a028a477c9767b829214ef5443a3ea513e672d0c6cf0ac2fbb72b56546c717fd68a2187e0b239910c8b511abf0e6786ef882ec3b0806b56576aaea6494df822ffb0da0df1aac2a730a8822bad5cb2c0001e4f103f43dcf83a22f2886048cb274c93a054097e4ad5b0e42917dc7b336b37604655c642dbce8e6e5a2cc4b58b50ddbf16cc8b4f8d291", 0xcf}, {&(0x7f00000001c0)="f735fab23b89f8056c3c69a893e1cd", 0xf}, {&(0x7f0000000580)="283a52e36e09bcf3f1e5197ba54b05d95d556e75265c476a50c451ccdd1a17bda7e6386527e3d916cc2b9dda97", 0x2d}], 0x3, 0x49, 0x9, 0x10) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x3, 0x5, 0xa1, 0x4, 0x0, 0x2, 0x80000, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000600)}, 0x18c05, 0x3f, 0xffff, 0x9, 0x6, 0x2ca, 0x0, 0x0, 0xc3, 0x0, 0x1}, 0xffffffffffffffff, 0xf, r1, 0xb) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000700)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) socket$inet6(0xa, 0x8000d, 0x1) r3 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x10000, 0x800) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1060400}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x0, 0x201, 0x70bd25, 0x25dfdbfb}, 0x14}}, 0x2) ioctl$CDROMEJECT_SW(r3, 0x530f, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000006c0), 0x80000, 0x0) 01:39:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000001070000009100000000036ec4d68e442126b6be74d25e5be5b3400000000000000000000002000000000000000000ee4200020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 01:39:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 01:39:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 01:39:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe4) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000df792f528b28fa9a5ee300000000000002000000000000000000003800020000000000000003c565e64fcba888d3db09febcf60e278aa33682a1daffd74d5dc57b383f3f90987374028d73dc6da2598ac679e78e3761a0ff6f00f3fd17d469521d55d3ec7266a90386a95c2f99", @ANYRESDEC, @ANYRESDEC], 0xaf2) close(r0) r1 = open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) write$P9_RATTACH(r1, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x0, 0x0, 0x7}}, 0x14) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x100000, 0x0, 0x15, 0x0, 0x0, 0x8f6}) fcntl$setpipe(r2, 0x407, 0xfffffffffffffffa) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 01:39:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f00000001c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800000000000300000000"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x50, r0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '**%'}], 0xa, "859c31e227b1e53a65143ce8f350d03750e0fa181b482b1f093784ab7773460d8468d9698d89960bdc894f49a255b907aeac5bf89d777682b258b8f40988cfda4f96b0f803594055c1abe5a500637a689eb3dbadc2e5fd"}, 0x66) fadvise64(r1, 0x1, 0xd352, 0x2) clone3(&(0x7f00000008c0)={0x1552a75eced3304d, 0x0, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x61) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0xfff, 0x3, &(0x7f00000002c0)=[{&(0x7f00000001c0)="de09c2758614afac02f961862ec127e42078a8f0f96b1fd45cf9a9ba596813c4507fbd2f6e5e80c775251b57a450fa6cb86b279a8bd674c1f23622e52ffd6878a8392ce2905e6c", 0x47, 0x9}, {&(0x7f0000000240)="def2433c18cc", 0x6, 0x80}, {&(0x7f0000000280)="4f50f66c06d7fb741307e775428bf65229526db76128131b019d42c5eff742fc225f47d4a855e9db7882e7c10cd3836d", 0x30}], 0x15011, &(0x7f0000000340)={[{@nodots}, {@nodots}, {@dots}, {@nodots}, {@fat=@nfs}], [{@dont_appraise}, {@hash}, {@fsname={'fsname', 0x3d, '{}:])!:'}}, {@obj_role={'obj_role', 0x3d, '\x99'}}, {@dont_measure}, {@smackfsroot}]}) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000004c0)={0x0, 0x29, 0x9, 0x3, 0x3, 0x2, 0x2, 0x74}) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r3, 0xffff) renameat2(r2, &(0x7f00000003c0)='./file1\x00', r3, &(0x7f0000000400)='./file1\x00', 0x4) 01:39:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) fchmod(r0, 0x82) close(r0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$BTRFS_IOC_RM_DEV(r2, 0x5000940b, &(0x7f0000001940)={{r2}, "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"}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f0000000940)={{r2}, "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"}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 01:39:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000f60000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000401ca09b5e2f9d4347abd52624323bd00a00190000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(r0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:39:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x410040, 0x80) 01:40:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x800) pwritev2(r2, &(0x7f00000000c0)=[{&(0x7f00000001c0)="dca4068a5c97ad93b20bf175adb95ad5cbef9000f424d409bee2d87e2b3da2cfde686c1cde617869b0a66f3440044fb3a5d1208e780f117409b74806434e0934da4726932e05ec3f88f5e3426db2165024d8b14fb78ede9be5a9ecffccae5f1b74da6e2b81a6bd19a3bb8c47bc125e74435ff7270bb857ffdcbb3ea3a87b8e8afea5017a2aaf1bcb9b7ddb7b769349907b37100c1cf3dd93540567703314919c847728c619f242b78c80a3d084e0812a97b61cd6f80447012f1c7a02951e18d1", 0xc0}, {&(0x7f0000000280)="ccee61a193b61eee3b9974e5b6e6cc26ab70c00bbb1ed32a4256aa8ba5033943260ef6bb072b71700b7d6003ef20b5d5404c5d4d0e0c17d25e00cef1571994386946fc1d999a4dfc6667dac2c03b882fb81cb345b99ba1ef08773f196d469fc1c70b1b9f56557e3515f5d666abe304de2612f04baba12d27b3ab91e81444709a5fe7faa34c48882d162b8a181628f33794697d237310a86b4302f7fa889b76d3ebd0f69860ef5cfecef2ece07f2a7b47cd4e2878da29717e154d81d8a1a41371b5366ce81b1b029118756b85ad6ea5617da85012230a9b7d27e971f8e0fe4f", 0xdf}, {&(0x7f0000000380)="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", 0x1000}], 0x3, 0x5, 0xc0, 0x2) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20d315) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1c, &(0x7f00000000c0)="7803cae90f20025bb99187836765", 0xe) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) r2 = openat(r1, &(0x7f0000000100)='./file1\x00', 0x43, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="7f450c4600000003003e000000000000000000000000004000efffffff000000000002000000000000000000003800020000000000000003000000000000000000fbbe33919c743d2ef06563935fd576625db6325245"], 0xaf2) r3 = accept$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) dup3(r3, r1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20d315) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)}, 0xfffffffc) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_NOP={0x0, 0x3}, 0x2) openat(r5, &(0x7f00000001c0)='./file1\x00', 0x68000, 0x1c8) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x200000a, 0x10, r7, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 01:40:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 01:40:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 01:40:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6, 0x110, r0, 0x8000000) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r2+10000000}}, 0xfffffffc) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e20, @loopback}, 0x10) syz_io_uring_submit(r3, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r1, 0x0, &(0x7f0000000340)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, r0, &(0x7f0000000100)={0x1, 0x1, 0x4}, &(0x7f0000000300)='./file1\x00', 0x18, 0x0, 0x23456}, 0x8) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syzkaller0\x00', 0x0}) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=@random={'trusted.', '{+*&*{#\x00'}, &(0x7f0000000400)=""/194, 0xc2) recvfrom(r4, &(0x7f0000000180)=""/201, 0xc9, 0x0, &(0x7f0000000280)=@ll={0x11, 0x3, r5, 0x1, 0x1f, 0x6, @local}, 0x80) 01:40:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000700000000000000000044f1014000000000000000000000020000000000000000000038000200000000000000035d8a3a3f72ab16f6592d7a0f56087e77c8b25ad4c133cfde6c30f28902e35cbd69e2eeb8f95b3b5e7a9ef1263d48a350eb2e429c9858141dde6d531d8cc9c49ea90b176bee84afcff4fc232aa2870971d61615ee577098b3ced7aed98576e68b1486ca92a152762f3755756137d7a97128bee41af39b1631e0cc1c9a679c62f494fe8c00"/200], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2105.173425] audit: type=1400 audit(1722130806.965:13): avc: denied { map } for pid=100965 comm="syz-executor.3" path="pipe:[35239]" dev="pipefs" ino=35239 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 01:40:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, 0x0, 0x8f6}) read(r1, &(0x7f00000001c0)=""/162, 0xa2) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2105.455660] tmpfs: Unknown parameter 'obj_user' 01:40:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) fcntl$setown(r1, 0x8, r2) [ 2105.476810] tmpfs: Unknown parameter 'dont_hash' syz_mount_image$tmpfs(&(0x7f00000004c0), &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f0000000440)=[{&(0x7f0000000940)="91d565461152cd6a717ec3436ba1f36709f8acbbaaae8aa029849ade92af7588de706885ed820bd1f187e7ffe52dd1383197fb411898e5d6a002bc0e5901bd8214fe59b83137be6e32612ccaaaf31adbab2cd3a57bc8bffd044ac3dd7e77058b692b9872c80c54b41fd9142262475a1ad5905007f5cadcdc0989324b9d01e74a7449d04340200877e3a9d297d9c45ae8b1a5cdc23b78458b057af9a63a3777230ee1dd174023fb1291a69873007335c6d6e5e9f28570fe3750320067406f59faf63d9eff3e03c1579700505acc4f175e759a6b52a4b6b59ae35391a6d4bba88a7afb273065d6d0734597307f91d6ebc06d061a36e1a0fd3388cc348dede6e0afef8484dcd39086621eaad35f5c7a0ff772b7f9d85c43207228159a0050e42890638b05bfead97fa8d43430a5474dd24249e2bd5d13a5aaee62d0f48c6e3b81c6b3ae807c298fd027e8657e1abb2a79f0ca40a1a7bbf8ce88d0d8c63d34b726905578a5d566ccd72505dbb4d221ddc62d23e3adfb7c8baef4ee7e41110444649218194288d20dbeb57e536726910cf50d5e15d7ea59911496c67f1fd57fd37b8672668f8977e9279433bcfa39932a4e326cffb0083fe5bc561c1a62b5571b90f64f6989ef4a92d92a71502aaf7892f693ed553bae5e4a20825069f31ce36f683e1dcbd2f5c4c18ae9f3885726b68d430dfe6735caa10dd3868e4faf27798a01441d85fd9715baf7bf885c61b84847e9bfa047fc4274179f0f683de4a8eab96464879a765ad32f215c44139cbaa027649d577b6dc267817f9ec66d3c43b49e7d4bc0fcbbc21a70024cec0279aa66127360f5c9c75f58cde9e0aaae86ba067f2a0bc62f86b2fa89634006931c32de271e308902334f84f06c00aa9fb946829665a49d8c689a7e875da07bd57e263fd67c9529135b5a20b7e45fb73a62c1274e8e0a0bb8ce082218ff46f7f249cac99aaf26b2450b0a5137e62cdff69979b198b5b85d04727914939adb2f313cc4fcb13665879f717fba266fe2b3a49cc7b060dc6adcbe987bce67c2042c2200cde03e5819e4eb8d0d6d0a4c8f63ed2f915d2eb152efdb7e76ed9c1f642d26c2b09baf51d8290678830814f147f288c4a127a242dffc3e473a46366f3710b898b1f80117dafef2ed1a1189c904b0d6ba707548b1df997eabd29938f4c535f6edcd199f5fea52da339d6317a48a19218f679147c263e47aa59befde2f078b7e0de23516779cc2bf08e2f51afb8b55a0936c1607b881bb8ec11e2903994135db45009455d9af875bea7c402875bf716f62ec62c09c2f43aa9084e9f1deccc436551eeca13f594bac608900f0a0cf1ebe2f7e81ef2b059f581a71d6295dec0793c9bb5677c5d99b0bffee05c387885a7142410960444e7fca27438c79dced361bca2dd4a66e3b80b3a9f20de3fd88834cf880a05cc5ca80737505f6959e7f4c5e27c2bbac601d529fe3be5ca9f23c7f8fdb19cc2ba6a041b2f6c215e23e63971d373d341e35303437eda68566b8bfa104d57c20614035a5d0e8b2db9c73bc8c07fc70fdb956af47ce484ce06dbf8214e51e66571be37c704f7248575ad72ce77adad8af7a0663aae0bc19b28eee98457027f89b9a7afe373919dc121677409ff15b34947ba40ffd285128a0a9a160ae711ef99e11a099ac431d04ec427562c1eb1ac8ffd52192f80b09e852d3d2897b4bf15c9e16ac0589d25f5a136330a6633bf00ea69f1fb407d3a89f624329078bc0da4b51bb1c636503a67d756263035ed898821785f66d62db2548fb71d8932799ddf17c63b17af34ebccb0a0c29f57acc16c11a4f83780f8c7ec63cddc17d75e5d8d85b7164be21c418f752f684226dbc54d7cb02912d3fb331b0e984c4f20733e4e89d108912eecdb3bc0d476ae5e2a2d1b6bb797a242033de55bc282bd7aabb985a9eaf0c468bc64535e900d1eca9d795b915a9f30c83e8d37b5d49a1c9b5ab1c027af15902a2f21a025022c6ff51dd211ff9b37479f024532b65db1a27165962d17d455b3d8ea8fbea60946ed7579b3e3898fefcf274dfe0801b91cd8e835152ab0fc138050c9da6f8c782db5d08882d267215b36fc491b554750fef8647f7a807155e21db42c8f2d1a2fc855ee3d0c16ea02a6ba3be4f7fe7a6eb21d572c0c4fa42b4b53a17f2600e39d93d9dca7cb8c992bbbcfc2753d8bcbbabdc48b3aa4a98b1455422d12afd55f099c9c8113fa02f4f214affca21b31dbada7fde94b0fd5d380f5110f767f7be29c671fb0dd160b98f0b4b09c698bfc19f0acfee31db2271128143fb989538d5eb5aa77835d17e5306ffcc5ee56f84a2dfdb3c517b84f162e4bb4935bf79abe95d9bac39e6ece85020b0218e3a8f98a06909e26703265942803ae81a4ad9d62fc7d898a72e13c9608bd4f5a30cd7f5db58201783bc750296547c7a6c42e62837dbf2bdb4085d2a01251624e3e5c9b75987b51a20ce2f81c9c0ed14eaa9de6dc76bec4f8e78a22c3c83ba6e1f0394f1927a435c34d001ca608041c417e6dc536c2a1b4de3c08c89c3d06347ae4520dbb2e20b63b8e8bbd856df3fc045ce86aeeb20ec514083a4b8f137d1f95cf679c9609919a15589eb8af2eb6c84b003719f297f1eddddb72c3215e32f7db4ec1cb0f22f01599995ebc2dd1c40853f588263c9cdc8ff4abb489c3dc195fa5287175c75b2add81d5e0eaad9c46bbeee23fe66d79863feaa0dd05cbc6475e889e8f129956d228db36dcbd58661a9c2105bee4ba5e7d4eec40ad4dc15bbfb5e084d282e9357f3af4263c66d680f971a8169520cdedc290cc05a522e17404789fe55166285807dbc7360255fa5f37e18c7d500cb077c4db56bfdef4f7a7c3566050ffd09d3a3861366e8da73a982dff8fcc7fe7e5226e91bb3cf0f3a635e7c3439f6c65c6ffdf7aad134123899850969544cec18a234bd696b4116e14b6c93ae85d784db23fb107298382babce4f59ac3c25e84a6c5d1e7884264a5a2a1d560f43ff82584614a1f3509d7b2775ca986994a64c2beacc6d9f24164db45498d93dac93303f1f74aa10b2f406e04e8216b8cb7d856c4c0f7c76ea5cfe3dfafb0f6a8910d61c21b11742925a0a2d95ccb686e0f0e0af535bdf1d9b84ce846492acb289a91aafeaafb7c2209f2c46ee96fff7f79e86fd1aedff6be514e11a7468dbf600f0eef4ebb9187b88454bb413d2897d497701ffbf202cb6a26049757f55150c53566da134105eb5b8925732cfb5644fb1dee62cd0ac3b2d417ab13aff7e788205d3bcdad7723e6cd729d1a68edfd9e976201efe3862bbacb32f5f145dafaaec4f1d0446a0584edd389ac2dfa238807d5764454b460f4a9eea3b64672f88be78b0d0167ac5b0b9524986f0aada6be26df61f53ef82626284b3dc263ff8d81147afb582fe0df62f2688dfeea49493591f0c33411c5f0cc6eb9356acf7181f7c72ae4447e60666b0d1ffd5e6f1286680bf6efab0ff9c408ff5f9bf8c2011c4496a72fda1d2df55b579b38746aba1a418ec0a0b0ce47db3af017d683c69088490527e0efafbb0c7c61cc9f3bfbbdfe026ca19ff57c58d4fb8c28858a2071989bb12663aa1976de1aedf246d35cfd62818266842a2128808ff22bf8c6f6deecb136d9dd90d7984c35c7e9108e81a499698f9ec57e09ab6007fffc62957e9e6d669d73f8d82a47fb51e2e0cd88e0408dcc871c250e80bc2ed0dbadb28e93d5cd79f858d546d18eecc23b187c5af0eea0e81bb40af4f69a1aecb6d2258c15309569f1b64bd7cc3ec7a0c34b9c614c0c5014265939cce2533cb609a679ec13a112742dff6900e6417707f5f23bf027b4672ccb898978fb34325df35f84930110e7e76c3bff152f6143d34df9275e702eaaa2ede11bf298b9e4cf4d98f013c9b447ae2c57f3b4b2c5928c362f583498bec1e3c5bcf047b460a2d3db079c830b9b6ee4bafdbef1b7877a5924a1d938637d4d00f9c0346e9f5f34dff4a64f2f2996283dba2cf82f18dc23fca1fc2ecd35e03edc20b0b23d72767832f419373235c82258c99e9da4bcc54cf7c074411de6bbb6f54b24f408c41c4ab6cc18e564e0e5a1de91cc82ff11c1c20a3c64c335ab9f2c027506474813ec52afa652b39ffae8c6291868ffd8a26dce01aa297f4ff5033e240163b83bbb525a826c06318db726f6fee918297e26e7e82a898352a7e637392a59a433cdb5474620f6a9b8727320304eb7d89af115463fd7828bce8f40a7cf1ec6ce313e0d55976c1e8bbb9b5dfdafcf1de9394be3781cd727cb97ea5d02f9d99eef8c158ab39201357b9a27a61ab6891eba016ea82adbbff3d8660b9591f36aeb9a98beeb7b9069a8b09aab397fc1e3a8299a418c94aa9c6b2d1ab9e933e7a70e6aedc676f4071414888ff55dbe2943f411a051f87ef2da0f835522e023ca9f0a69840a0d81c0c920460e619f7f47782baecf1d8fa22738b902fc42625377343515e6a4279251c436252bca04885062ec52a71ed050221a98c6d13534944255b7ddd6f9840275bdfe1ccefdee5279cb97fa3be273a6a44d63399f21de34e37e0b0e16ba3a55c8c3c84c01f68da3b121833efb155ca219813962f4a96114085bf2b2cd818b3032e6b9a817e3bfd611c0c502960d6cd4f65aa7aaed0797ae11d62857a61b9f102e168da1b7ab8b7f8727c907e06266f1bb87f3617bb1dc1d3772129822fca2da78cf1f787b671c8d795fa6daafc8202f4ede52c01f0ac9e422afc4c42c330b7153f8355b30d47e20e203ff021f909c09704d336ccd18a42fa1ff00e45954c29b52dde1ac1660ce5f08759cb95b4b9177eae57af97e71eeec704138601d6e6cb4721bdf083215d88a9131613d350f704b9f03b064e261aa43648123ae80199558931623cff9070d66fd1bf4558293ced10a36224f2aa5a9a557b4e09c03000ece6d6056589e70078013753a8e0d288c0c5ff5289b71bd85a9a63637ca770ef1af51cfd3ecf2ff82273d10b4e29b6fff4931ed1028f80ce6ee0a13248d3e515fc7576250d938a42e8e9d0aee41d5dcf3773aa799d0499de2b499e0cbfcc5a5b9bd22a221abe3eed21c6bef4aad894842e2a1fb5aedf7bc0eebac302dd808ad2db79b6d5a0e5b6d0879a33088fe000fab18488bc3cd359de767fa80e38b179a442e0aa5c8cd8463235ab8b0a90253018fae5b46a647a7bbf2b1c9f410356846b731d183a615a4b7e1b0c0286ad2a1a9f31740dd48f9b21b59c031af9c4ef3bbf3776fa38c405a401fc39758a2c40088988832a2a988f2e93ac805f775886f80259faa2a7c20b0ca24e11d7363bfa982b225f72673429af0d38eb4588b213224caddd0962a54558635e61c9288ded9576f13b9ea96b5122783d48ce4fe9bec1f7265073ff9ef16d65f50a9920d607fb207f404caabe00b06d9120c9809050c1022bc3b02f39bd6c731a3e61d1fc7121257d33e5c05165544f2ea685ea2183f147885c95ba362c1b79210ac6142c3e56582241243184715f30b2a4fcb883f19af2fc92ed62d7b78c10d6e9fc388d3fd8e9bffa60e07348f60806adccb58cc0f05dbf87d7abf11aec4496c1170ceb00d987606102443b5206e9c045084fc9705bd1b570f763879ce203c4bd430a1bbdf8fb563c493104958fe7fc1b2984d0c28c323eb56144ebfe9b138434d92b0d0c3f10800751523fa929fa6a52255e3711e06472441d62eb568738b64b01585c020a26069e190fb1cb5ffd9aa67303118f87ea00239edba8fcc1f9e70f0714a713fbae07cab297f2484b07bb7159a3e007", 0x1000, 0x400}, {&(0x7f0000002bc0)="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", 0x1000, 0x8}, {&(0x7f0000001940)="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", 0x116}, {&(0x7f0000000340)="9c9124f6777cfd62636010419e0f72530f778308376b1a559c36477e3b97e054d0b61b6b064908ab380037895431e20e42ce794d2d3ef1ba4ab96aee30eaf8171cbbb6c075b65b61dc262ec5f1a4eb91f61cb6a6ca6089935a1e5a2b57faa777f35fd1650560419fda5246b13b866e17e4e458f356708aef6970bb89c7699b2b7e38c0673612c9d71739063f2ef1e4b103fc5ad5d835ef6cee4c6ae1f13d765414cbab18459ef04f5d8039554c7c4698a56a39346b2b7536537a969c732e2d8cc82080fe7e8173d301b5d57f30b222ab7a95bc44", 0xd4, 0xe6}, {&(0x7f00000001c0)="ef", 0x1, 0x7fff}], 0x800001, &(0x7f0000001b80)={[{@uid={'uid', 0x3d, 0xee01}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x35, 0x31, 0x32]}}, {@uid={'uid', 0x3d, 0xee01}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_user={'obj_user', 0x3d, 'mode'}}, {@audit}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@fsname={'fsname', 0x3d, '-'}}, {@smackfsroot={'smackfsroot', 0x3d, ',\'-['}}, {@fowner_gt={'fowner>', 0xee01}}, {@fowner_lt={'fowner<', 0xee01}}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}}, 0x1c}}, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f00000005c0)='./file1\x00', 0x5, 0x7, &(0x7f0000002a00)=[{&(0x7f0000000600)="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", 0xfe, 0x1bea}, {&(0x7f0000000700), 0x0, 0x5}, {&(0x7f0000000740)="fc1c55e87c6d381979d8f8f73e3af5dbff88ec95515dd42690e4c3", 0x1b, 0x4}, {&(0x7f0000000780)="7fe027ebec70127d7ff695235703aec175237094da14e6b1b685e65ba57ea0d4df6e65b0740e52", 0x27, 0x1}, {&(0x7f00000007c0)="e6816b076615fcc5f5a4e00011bdbf39e0d073e7d099ce4dc0eaccc7bec0a24b1ba0165c7dd54cc9c21ef18290d09cd7db086bafa7e7caf86dc7e117d14a5f60e67e2dc608627829bb1835", 0x4b, 0x2}, {&(0x7f0000000840), 0x0, 0x1}, {&(0x7f0000002940)="08fbd211119b53d29759814d823ce355502e57dc16734241597b9a62e40fc95c74e3fb9a6fade0acf27f880b4daef1c043835eb5a6f7a7185f84410a5b59bb58540fc999d9922a25fcb35f2280fada381be193a17ada530639ed4822c1163b63d4db022fde50e52595a7ff8d1d24070d31ed1110af68baf96f74a00e32f10fcf0b1e68096d08afb7c8b45dd25284acf3415db8e8507400a0a18c3b434fcec0f49bd7bd7d", 0xa4, 0x100000001}], 0x1000000, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x4}}], [{@dont_hash}]}) execveat(r7, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0x20d315) sendmsg$NL80211_CMD_CONNECT(r9, &(0x7f0000000700)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0x88, r5, 0x300, 0x70bd2d, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x80, 0x3a}}}}, [@NL80211_ATTR_MAC_HINT={0xa}, @NL80211_ATTR_VHT_CAPABILITY={0x10, 0x9d, {0xe000, {0x1ff, 0xffff, 0x59fe, 0xbb0}}}, @NL80211_ATTR_USE_RRM={0x4}, @NL80211_ATTR_USE_RRM={0x4}, @NL80211_ATTR_USE_MFP={0x8, 0x42, 0x5}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1f}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2b}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x35}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}], @NL80211_ATTR_WIPHY_FREQ_HINT={0x8}, @NL80211_ATTR_PRIVACY={0x4}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000801}, 0x804) 01:40:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 01:40:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 01:40:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 01:40:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r1, 0xffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001400)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, r1, 0x0, &(0x7f00000013c0)={&(0x7f00000000c0)=@ll, 0x80, &(0x7f0000001380)=[{&(0x7f00000001c0)=""/7, 0x7}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/236, 0xec}, {&(0x7f0000001300)=""/85, 0x55}], 0x4}, 0x0, 0x2000, 0x0, {0x3}}, 0x0) 01:40:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80202, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), r1) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000) 01:40:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) open_by_handle_at(r1, &(0x7f00000001c0)=@OVL_FILEID_V0={0xc3, 0xfb, {0x0, 0xfb, 0xc3, 0x2, 0x4, "a02a5a3c2408325e4d34b8d5c8e5e4f5", "ee803a2c7692fedc050296673da64de4fa93859d7e89bd09fe852d989c27efbef5c5fbceb939013f44e5c9d085c3484e4355ebfa0d4d6d5c50118a1e38035de1c7205accdf2be80b98a511f32e4e50709f432d37ca05d72ddd54b849abf324bf3a86c5b4eff2d5763c7aba369206cfaa238811dd152d4c4e8f81d464d10ce19159fe5a5863b8a04db99dc7710518321f94692ee1beb7a9ff0f72456e4c66e3002857d7d8d8e866d575d3844b1b1f"}}, 0x101400) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 01:40:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000008000000000000000000004000000000000000ebffff010000000000000000000038d8011a33def0658a0003"], 0xaf2) close(r0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x6f, 0x0, 0x0, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}, 0x0, 0xffffffffffffffe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) mknod(&(0x7f00000000c0)='./file1\x00', 0x41, 0x4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file1\x00'}) openat(r1, &(0x7f0000000100)='./file0\x00', 0x84540, 0x108) 01:40:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 01:40:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x1e, 0x7, 0x8f6, 0x1}) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000000940)={{r2}, "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"}) 01:40:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000) 01:40:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000409e00003800020000000000000003401a8702556fb5122fb336465bd5f31fe953fc2ca30cb4644c01be"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x10, r1, 0xfa578000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:21 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x10000) tee(r0, 0xffffffffffffffff, 0x4, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0xe0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {r1}}, './file1\x00'}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0xfffffffffffffee3) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) listen(r1, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0x40, 0x20000) openat$cgroup_freezer_state(r3, &(0x7f00000001c0), 0x2, 0x0) 01:40:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46000048373cb0c7229689000003003e00000000000000080000000000000000000000020000000000000000000038000200000000000000033237db8d1ebb3124884433af8682dc5fca2acfda2bd155d64081abf5540564c8ced51220c6b80e44782d6f20ffd3a99417e01f4e5836c8d62606f9b640d0a6d1cdb865e810fcaae740b87530b792c4f006d0b3655c6e4acf"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f00000000c0)={0x3, 0x100, 0x80000000}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000724d6d1bbdc128770225d1f9057460f5000000000003003e0000000000000000000000000040"], 0xaf2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) close(r0) fallocate(r0, 0x7, 0x6, 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x4, 0x9, 0x8, 0x6, 0x0, 0xff, 0x22080, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x2, 0x1, 0x7, 0x4, 0x9, 0xbd, 0x70, 0x0, 0x8, 0x0, 0x6}, r2, 0xd, r1, 0xb) 01:40:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 01:40:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x1810, 0x0, 0x0, 0x2, 0x1ac, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff8001}, 0x0, 0xb, 0xffffffffffffffff, 0x2) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 01:40:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 01:40:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003000000000000000000000000000040000000000000000000000200000000000000000000380002000000000000000300f8df8e298b7889fe4d4f72d244c7852aa94f593a72f4cbb9599efebbf34045c7bc248e8d8add45a020a9e3e208717ef6c4abbf03f2972bead8359424d7b86cb7c23d0a54677b64fa4578c73ee3c044657cf78aa755cb7ecd0c3b7bdd1715a2eb7bc2612dfeb245d36ab9845821089fa1430f0ace75ad9c8248e66346f3895fae963b195f7a2362dbdf399c1216acc949a41137ca0ebe7b2408aba09a162e4c8dbea1f333d1e1a689f368acb51bb6d121f5d9f00b086aa0dcaa3463f6bcfd9dc32c34be2f5d67e8d5371f07a04fdcb5e1fc022fa57b56e33ddf7f8ad816a660b077f738b64e1bb6a47145b49e0975b49224e78da2690157e846770d148f1801bf1fb8"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) r3 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) fcntl$dupfd(r1, 0x406, r3) r4 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="404f0000a5078f74efc3e964b21ff220670966a29129", @ANYRES16=0x0, @ANYBLOB="010025bd7000fbdbdf251400000008001200fbffffff2400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300010000000800030003000000"], 0x40}, 0x1, 0x0, 0x0, 0x20040000}, 0x40050) ioctl$BTRFS_IOC_SYNC(r4, 0x9408, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8e24, 0x0, 0x3}, 0x0, 0x7, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x0, 0x16, 0xa, 0x6, 0x1, 0xae, 0xffffffffffffffff}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={0x0, 0x0, r1, 0x21}) 01:40:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 01:40:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a000000000000) 01:40:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x5e, 0x502, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x979}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x42, 0xe0, 0x79, 0x0, 0x0, 0x10001, 0x400, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7, 0xd7}, 0x10011, 0x2, 0x3, 0x4, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0xe9}, 0x0, 0xffffffffffffffff, r2, 0x9) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) msgsnd(0x0, &(0x7f0000000280)=ANY=[], 0x8, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg1\x00'}) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x802c2, 0x0) r5 = msgget$private(0x0, 0x24) msgctl$IPC_RMID(r5, 0x0) msgrcv(r5, &(0x7f0000000200)={0x0, ""/100}, 0x6c, 0x1, 0x2000) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x34, 0x1, 0x7, 0x8, 0x3, 0x3, 0x80, 0x3b0, 0x40, 0xe0, 0x4, 0xfaa, 0x38, 0x2, 0x1ff, 0x0, 0x7ff}, [{0x6, 0x0, 0x6, 0x9, 0x800, 0x7, 0xfffffffffffffff9, 0x3f}, {0x1, 0x3f, 0x6, 0x7fff, 0x20, 0xfff, 0xdfc, 0x10001}], "cdf5043b3391c1567a9d171be44f0bc0e3243ad93f12094d83dd48582500d9c69ec9beb024d8c021c53f8bf5ded85090449eb5b374abbe8bc1d7ff7ec885668afaa4ddf6f3faa7abeeeab9f049d51850cbb2a4e159c242854da25dc1abef58aae34ad988d11d7ca61b9cf6a967c06bea6c679ab095f41e19e2317d004665793cf5140fa9c38e48bd2c98d2d739c0dc1b123b80ffc90fce22729f51f7e31d98"}, 0x14f) copy_file_range(r1, 0x0, r3, &(0x7f0000000040)=0x7fff, 0xa1, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f00000000c0)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x1, 0x6) sendfile(r1, r2, 0x0, 0x20d315) openat(r2, &(0x7f00000000c0)='./file1\x00', 0x40000, 0x44) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x40802, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x18d93575, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r3}, &(0x7f0000000040)) fork() fcntl$lock(r2, 0x24, &(0x7f00000001c0)={0x1, 0x2, 0xdf6, 0x61b, r3}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 01:40:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 01:40:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x69, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xfaa}, 0x0, 0x2, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0xa6, 0x6f, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x80200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x621, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 01:40:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 01:40:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) fallocate(r1, 0x5a, 0x3, 0x401) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 01:40:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create(0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20d315) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xa2, 0x81, 0x40, 0x4, 0x0, 0x7, 0x4006, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x7, 0xda8}, 0x42802, 0x1f, 0x81, 0x0, 0x3, 0x8b, 0x0, 0x0, 0xd42, 0x0, 0x7}, 0x0, 0x3, r0, 0x9) ioctl$RTC_AIE_ON(r4, 0x7001) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)={0x2008}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x4905e000) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 01:40:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="4c60c8452e2f66696c653100"]) timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4}, &(0x7f0000000040)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r4, 0x80049367, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000440)={0x4000000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x19}, &(0x7f00000002c0)=""/4, 0x4, &(0x7f0000000300)=""/213, &(0x7f0000000400)=[r1, 0x0], 0x2, {r4}}, 0x58) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000180)={0x30, 0x20, 0x10, 0x19, 0x8, 0x80, 0x0, 0x5f}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f00000000c0)) 01:40:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000086c6f6c99237683a0000000000000000400000000000000000000002000000000000000000003800020000000000000100"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x81, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x1d5f, &(0x7f0000000380)={0x0, 0xefd6, 0x8, 0x3, 0x12f, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000400)=0x0, &(0x7f0000000440)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000740)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, r0, 0x0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/219, 0xdb}, {&(0x7f0000000580)=""/68, 0x44}, {&(0x7f0000000600)=""/147, 0x93}], 0x3}, 0x0, 0x12101, 0x0, {0x3}}, 0x81) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000980)=ANY=[@ANYBLOB="7472616e733d7463702c706f72863d3078303030303030303030303030346532302c756e616d653d7b2c76657273696f6e3d3970323030302c6f626a5f747970653d7b7b5e242c7569643e906bbd76efd5da0d988de98657ec4f3f2219a9d02d9ccec17f83c0bb7ab377c0e466263137fbe9dbc266c6cc1a690e74dc4e4b1b4f05e84a79c526012271fc3632178e3f83406254f48ae5dbc4dab7432f4f0638b5fcfb3d6aa8", @ANYRESDEC=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYBLOB="2c687973782c3065726d69745f646972656374696f2c61707072616973652c61707072616973652c6f0b5b4b568a6c47e3f4f156b258a15faf198ecd636ccd118ff2908eb6dec3d0066da8250403002adc7c85710a89a43ff6dc4ccde43d88ad566b74802839970900961c57c8ed3e930c72d9520e06e2305700000000000000000000000000000045d3b9639f4a6c42af4e8b5c42011dfe95cfd4c1b17e253f0459bad51c1c2896d2ff2f8c218e5fd4d48bb980968c7bcb0900e68362b38cb0b0513627319f50a6"]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x401, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setxattr$system_posix_acl(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r2, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="0400000008000100a6b49299", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="10000000000000002000050000000000"], 0x44, 0x1) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20d315) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r3, 0xffff) openat(r3, &(0x7f00000000c0)='./file1\x00', 0x100, 0x24) r4 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x1ff, 0x7, &(0x7f0000000700)=[{&(0x7f0000000240)="2eec584fb5a9e9a5531cd53e717041548e7ed20720f9561b8adc5406623446c5e8df56bfe990b03994dff20f1da6d1f63af1", 0x32, 0x80000000}, {&(0x7f00000002c0)="f984b199e30a6e1e747467ef2362e0c3e53d7bbf9aaac665c355d9523cde810dcf8162737ae196a352ffbdeef82a5d1404b8c80e09580014d3c4f5f373eedf912d1e54220e482e26afb0639a9c5ec40f4457a777fd539c862b43bf191ee2c9d2b774bb38019b", 0x66, 0x5}, {&(0x7f0000000340)="94a6ce5890597dc0e3e2d0781e241650dbf85357e819cc874f0b75fe31fb9e6c3d6043e320107eec08b7ad7a3259b105c5e7f00d2fe335405d6c62a09f76959a09ace3476c2aea7bf24728365204d481ff5b92394e1007da415f5ddcebcbd21b6014330d91e0f29d0869e33559422d8a39e6054da48853c8d3f8af21316aafc5e874a30f1727dcba71b91dfa2ac93f981fc2334c0a5365ab53244d003f828d70", 0xa0, 0x8}, {&(0x7f0000000400)="6d574e8209871cb148676a1a4bb85f02c8a2df145584b9ee0400ce0fea02ae8e8937445e7d969296870c251e22c14324949c99ab65c6e94f9dd42bd6858a31d424dac6cd4ef14c5cc407022acf833a65531b9bf42c64ffc19f6b065e6d62d520df798ac277bd2fcd0c03c05b19048d2069be1e633812c2d916ad48482f5013846c8692a2911e28ac853cb4f9f80cd06a36b7b4ec7534273282d0fa71cbdf2afe0355e97ac99c60ba9cd136560c407393ee87d10eb227f0cf7a385de7c43131288c5d258cb81c11ffa3f6dea488752adae0191f3ce9", 0xd5, 0x7}, {&(0x7f0000000500)="7ebabc953ea33810df501f2fb2e3322ebc6608a17c9a569edcc7492fd98e40fc8df219b0035deaf2d3be410ceea14763fab1b486035aaf9e37b270c204653ca98bbcf9b4914774e6344fdbd479e155d4721f497477688d03480d47cc2b66ff343cc8923a5e8611dabab0f289a9c33a255a372415df93f93a42b5e06fbfa4cbe8684a42d50f1a815f4a05b63b9f2178d5e0cfd55001761dddc134ab27f76917c413e11396786ad2f2272e0636c8f63e7566847221cc9bac4253f5b8c50a4a4bf850a083cdbdd33ddf2f354e45144ba3b1e687172c99f71a1dc649a7", 0xdb, 0x9}, {&(0x7f0000000600)="be3477d1574a2cd63e40aa738bb4cfdefeb87798d223bdb4ba7e3c0339c2c599f316e297c69a6e42ef31fb1383260b62f0fdf3aa06d9b056e5b9385ec77a9ae7508493c3c38df0e09bcb2f35217a4b9efaf4f162bbc7dd9e915c6d03d554f4dba3518e6d3de5", 0x66, 0x101}, {&(0x7f0000000680)="1410c2878af696189ffea0bced8464ec99fc04e63085882e114ddfebed994b3e8f2d3d8d83d311193d3e63aa7cada0b4af0c926c2d1502c25e6729d629bf17a0c84d0b77ee2ed6e303f4bb3b6d30", 0x4e, 0x8000}], 0x2800, &(0x7f00000007c0)={[{@noquota}], [{@obj_user={'obj_user', 0x3d, '/-#&('}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@seclabel}, {@fowner_lt={'fowner<', 0xee01}}, {@subj_role={'subj_role', 0x3d, '{*,}%\\.%:\''}}]}) openat(r4, &(0x7f0000000840)='./file1\x00', 0x121102, 0x2) 01:40:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) [ 2150.938482] 9pnet: p9_fd_create_tcp (105213): problem connecting socket to 127.0.0.1 01:40:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000022000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 01:40:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x80, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20d315) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimensat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)={{}, {r2, r3/1000+60000}}, 0x100) execveat(r1, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') openat(r1, &(0x7f0000000100)='./file1\x00', 0x40000, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 01:40:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 01:40:53 executing program 1: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/38, 0x26}, {&(0x7f00000001c0)=""/234, 0xea}, {&(0x7f00000002c0)=""/236, 0xec}, {&(0x7f00000003c0)=""/168, 0xa8}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000480)=""/251, 0xfb}, {&(0x7f0000000580)=""/94, 0x5e}, {&(0x7f0000000600)=""/8, 0x8}], 0x8, &(0x7f00000006c0)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f0000000700)=""/56, 0x38}, {&(0x7f0000000740)=""/161, 0xa1}, {&(0x7f0000000800)=""/147, 0x93}, {&(0x7f0000001940)=""/93, 0x5d}, {&(0x7f00000019c0)=""/240, 0xf0}, {&(0x7f0000001ac0)=""/161, 0xa1}, {&(0x7f0000001b80)=""/203, 0xcb}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/5, 0x5}], 0x9, &(0x7f0000002d80)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x148}}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000002f00)=""/6, 0x6}, {&(0x7f0000002f40)=""/29, 0x1d}, {&(0x7f0000002f80)=""/189, 0xbd}, {&(0x7f0000003040)=""/60, 0x3c}, {&(0x7f0000003080)=""/211, 0xd3}, {&(0x7f0000003180)=""/67, 0x43}], 0x6, &(0x7f0000003280)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000003380)=@abs, 0x6e, &(0x7f0000003680)=[{&(0x7f0000003400)=""/67, 0x43}, {&(0x7f0000003480)=""/11, 0xb}, {&(0x7f00000034c0)=""/133, 0x85}, {&(0x7f0000003580)=""/203, 0xcb}], 0x4, &(0x7f00000036c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}}, {{0x0, 0x0, &(0x7f0000003c80)=[{&(0x7f0000003740)=""/29, 0x1d}, {&(0x7f0000003780)=""/138, 0x8a}, {&(0x7f0000003840)=""/3, 0x3}, {&(0x7f0000003880)=""/242, 0xf2}, {&(0x7f0000003980)=""/88, 0x58}, {&(0x7f0000003a00)=""/194, 0xc2}, {&(0x7f0000003b00)=""/166, 0xa6}, {&(0x7f0000003bc0)=""/168, 0xa8}], 0x8, &(0x7f0000003d00)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}}], 0x5, 0x40, &(0x7f0000003e80)={0x0, 0x3938700}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000003ec0)={0x1, r0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x18) 01:40:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 01:40:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r2 = openat$cgroup_procs(r0, &(0x7f0000000600)='tasks\x00', 0x2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000640), 0x800, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) poll(&(0x7f0000000680)=[{r0, 0x1}, {r1, 0x8010}, {r2, 0x8095}, {r3, 0x4402}, {r0, 0x2100}, {r4, 0x1}], 0x6, 0x800) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000070000000000bc22989b00000003003e0000000000000001000000000000000000000000000000000207000000005f2d27f7a2b0d4aca73b6bd9fa617744e9837372a9"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000140), 0x100, 0x24000) writev(r5, &(0x7f0000000580)=[{&(0x7f0000000180)="71dbf5d28e5aed28f5eb3889df90ff8b2eaa3f246c7a5a69b1cc76e95826a77431c5952c00dfecd06c0f0490e0c9261a82cc235037809102ead4bb0aba23a3576410628443fa03ba41a06c0da8e59ee25392d7fd08ae055c0d91e4d01473c0367b0272968855cf49e58e7704de4f8f70325e3f133f802c23cd88bc4b4aa67f145ed51202125d3200faf86339d157c77fd32317d6278d0b5d72b54cfe46efdd90eaaf650646d70dd7dcc0268f0d0db56b12ea4abae7c764bfd91d1b4c3c282960d08876ea1ef999ae59e4d156acc625c57e4e798c108f910fb0ab", 0xda}, {&(0x7f0000000280)="448d7749c0f78db232be3d8f4b79fa1592f1e5ff5903e7f9ff31d444c28eaff365e2a02f0378edcfdc434af8b5eaa463d79d4f69", 0x34}, {&(0x7f00000002c0)="0ce4d15768b3eb1b96dc98dbfdfc4b4261cb2832e682fe5b0d8f6e3b92c56da7bdc7efb6f8d9666ae51d9490fa62de2c0231bffd6202a3763ca513f0863d910bc6db909386c4cf50ffba2cf129a6a858dbc8d57b147d81668c67617ca3b8a0d96df6cd1116ce5d57134e0676303c40d4989f58e625df19a41958f12676d03fe54742e35c52557556acb4ab73f6b99d4946ce93966708693bb9ae3ecd2884abc7909ea83ba9460ed55be002db6f053fe6963a7a009b85c81b7f66efe689491309c0bef31af40a45197ce1053cb0a6", 0xce}, {&(0x7f00000003c0)="d2817a7d451023e5b595c2891f48d0b7992f1e6bb6431babea3e98206b33fd4871441b58b834389d9238ec5c519c14fe2c60dcb8725bb56917e5d89e9b24e5905d00fb684b0071592e0daab16a5fd3b1ce6ffb7c24cbf287ffdd8e5daaeb95fd9a220a69dce91f9eb89c58a356308881b4b2fe4736b8c661758084cc7c0f1f66b404867ebf4eaee0fe465a9b69ca14d2363286478b66d98d34db934138e5a1b85ac639201b5f3e2039688943538d78", 0xaf}, {&(0x7f0000000480)="43bae0ead3c8bcaf5636d95583e04afd25fdbe621e3b4b97ff06cdb6a6f74c2aa1274cd97eaf7ae4b9cf9a1b341c5fe88dca204bed25eb51343aaf197f67c25e478957d013c1fe7b4ebc9b4c2667f3bfee12574317714360d860c77d7322bb30f42fc9445612c3457f71ee268ea8c5700cdf91465029615650836b251ac5ac301e3873047160c6f20974d23bba0d98dbb9c089c8077c8edd632718283575216db0a6", 0xa2}, {&(0x7f0000000540)="b6e6a5566aa9f712056f0cff46f61ee08579e5dce86192e4952f6f66ccf88bdc848158cb5c1c430064c5ffabb432da1c9effc5e9", 0x34}], 0x6) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0xc042, 0x84) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000100)={r1, 0x5, 0x5, 0x138}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x6}}, './file1\x00'}) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000000200000000000000000000380002000000000000000300"/65], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x5, 0x0, @fd_index=0x9, 0x0, 0x0, 0x0, 0x3918e5831ea82706, 0x1, {0x0, r3}}, 0xfffff001) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(r5, r6, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r7+10000000}}, 0xfffffffc) r8 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) syz_io_uring_submit(r8, r6, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r8, 0x0, &(0x7f0000000300)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0x7, 0x2, &(0x7f0000000240)="fd544c866e981f9447d704f4fd894321f54e86646ab5e4e3340f1acc025bb8c07b13bc6f148ce51f137044bf0fb6bacbfc1ccec4da1be617b05a3bf398fdae51f889dfbdd231636593f0adb12157e7ffadf51729ed587f9e013555c928c47ee11657a63b7c753f44cb1551840c78fd59efff143af0cf3ef85f9c241eb2b5c0a38b8dc995584a6f33a11a26923d44809f55f3da196bc6095e664b3217dca1672cc7776357f3847ee3968cc564af55525aabdcef4b0deb13e3b1", 0x1, 0x0, 0x0, {0x1}}, 0xde35) 01:40:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x8001, 0x4, &(0x7f0000000340)=[{&(0x7f00000001c0)="16", 0x1, 0x1}, {&(0x7f0000000200)="caecaec2d189997845c7f5184236cdf9027b230da5e72704bd12", 0x1a, 0x7}, {&(0x7f0000000240)="198dbc85cc91fc91ae273aa991fb19bfc9a6fabd566375beb5f1201acf0c7f81171ffbefa697fc1e", 0x28, 0x8}, {&(0x7f0000000280)="fd6dcd13f6b11cfa96d5bc80bbaa42c5c203288bf855600d0f400533c18f8bc35c7cdffc79b825bc3205fcba25f75ee1f0b2f45b6ee3fb1e6261855f4fd711af398967494691a8938f2b30ea968b3ff2684830f311a5b5cbbe9398f3c78eb1c9fbf8f2bf697e990c9ccbb9d732b65d6c0598c4c7265b4aa291ed7c27db30ef7f1be3dd22ed2afdeaf943fb117440486f0cb3c03c79ce3a8cf6d94be5", 0x9c, 0x1000}], 0x2049040, &(0x7f00000003c0)={[{@bsdgroups}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}, {@quota}, {@noblock_validity}], [{@dont_appraise}]}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:40:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 01:41:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002400000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x600, 0x0, 0x80000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) readv(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/194, 0xc2}, {&(0x7f0000000100)=""/21, 0x15}], 0x2) 01:41:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) 01:41:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITEV={0x2, 0x0, 0x2004, @fd=r0, 0xffffffff, &(0x7f0000000200)=[{&(0x7f00000002c0)="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", 0x1000}], 0x1, 0x2, 0x0, {0x2}}, 0x80) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20d315) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x4, 0x1f, 0x1, 0x0, 0x80, 0x400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x40, 0x1, @perf_config_ext={0x7ff, 0xe4b}, 0x1004, 0x80000000, 0x1, 0x4, 0x8, 0x17, 0x0, 0x0, 0x6, 0x0, 0x2c5}, 0x0, 0x3, r2, 0x9) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 01:41:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = getpid() r3 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r3}, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r5 = dup3(r0, r0, 0x0) r6 = gettid() clone3(&(0x7f0000000500)={0x104810000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0x3}, &(0x7f00000002c0)=""/112, 0x70, &(0x7f0000000340)=""/235, &(0x7f0000000480)=[r1, r2, r3, r1, r4, r6, r6], 0x7, {r5}}, 0x58) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r7, 0x7001) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r7, 0x7003) ioctl$RTC_ALM_SET(r7, 0x40247007, &(0x7f00000000c0)={0x19, 0x36, 0xa, 0x0, 0x0, 0x8f6}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x810, r7, 0x26a87000) 01:41:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 01:41:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000000c0)) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000000000ff070000000000004000000000000000000000020000000000"], 0xaf2) close(r0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000f10600000100000000000000f078000000000000a04c5e150000000002000000000000000000000000000000000000000000000000000000000000000700000001000000de0a0000000000000900000000000000d1e6000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000099a268300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d4df743a514e5b70056400"/704]) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001100)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000100)={{}, 0x0, 0x0, @unused=[0xffffffff80000000, 0xfffffffffffffffa, 0x101, 0xfffffffffffffffc], @devid=r1}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000001c0)={r1, 0x5, 0xb89, 0x1}) close(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) write$binfmt_elf64(r2, &(0x7f0000001500)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x38, 0x5, 0x2, 0x3, 0x3, 0x3e, 0x7, 0x347, 0x40, 0x135, 0x3, 0x100, 0x38, 0x2, 0x0, 0x7, 0x7}, [{0x1, 0x2, 0x1, 0x6, 0x100, 0x3, 0x5, 0x7fff}], "a214897504bf0bad6b5959bd5211d34a57805acf64f65cda8d916af5f56c610660ffed1cb950fcb24bb0bc56db1c35f2cd4bd6a03eb8dc57ef7c71ae06281163eab18919a94a3e670995cf4f1a30787c8f31a534c17791a9bcd4d3225961817be46eabe0235c286369a9d04af90811b12d7b48aa7fd1a5be0fccd8b6a0", ['\x00', '\x00', '\x00', '\x00']}, 0x4f5) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) creat(&(0x7f00000000c0)='./file1\x00', 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x10000, 0x0) openat(r2, &(0x7f0000000100)='./file1\x00', 0x10d000, 0x21) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:09 executing program 7: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000000c0)=0x91ca) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)={0x59b, 0x8, 0x7, 0xfffffffb, 0x5, [{0xfffffffffffffffe, 0x7, 0xdd06, '\x00', 0x2200}, {0x100000001, 0x2c1, 0x9, '\x00', 0x2183}, {0x0, 0x0, 0x8, '\x00', 0x3083}, {0x9, 0x100000000, 0x1, '\x00', 0x200}, {0x3, 0x0, 0x18c0, '\x00', 0x980}]}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f00000000) 01:41:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x100001, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x40000, 0x2) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x24000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x96d}}, {@cachetag={'cachetag', 0x3d, '*!,)&\xf3'}}, {@access_user}], [{@fsname={'fsname', 0x3d, '\\!['}}, {@obj_type={'obj_type', 0x3d, '%+*-+-^'}}]}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="01000000010019199b4566696c653100"]) clone3(&(0x7f00000008c0)={0x823c0000, 0x0, 0x0, 0x0, {0x42}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 01:41:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 01:41:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r1, 0xffff) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x29c, 0x0, 0x8, 0x70bd27, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x2}, @NL80211_ATTR_SSID={0x1f, 0x34, @random="ecc77921633c56fea5259184cd83e2f917a6e2082b3a2fe73823ab"}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @random="92bc1e9eecc2"}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3}, @NL80211_ATTR_MAC={0xa, 0x6, @random="290216b26349"}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7}, @NL80211_ATTR_IE={0x225, 0x2a, [@mic={0x8c, 0x18, {0xf76, "a98410ff57a1", @long="93059e60f80926c4c7774e2c98a5b585"}}, @link_id={0x65, 0x12, {@from_mac}}, @channel_switch={0x25, 0x3, {0x1, 0xb9}}, @channel_switch={0x25, 0x3, {0x0, 0xc1, 0x4}}, @challenge={0x10, 0x1, 0xb8}, @random={0xf7, 0xcf, "68031b0c23bc450884fc33b24293476dfd817c1b0b27254a4bbe105ad1b67a4b44d4e2126d8b096bc6e3ae0a6748b6b3aaff8ab9b7fdc10a256cf5037a82e41df57cafb8587d35c22676d288c52936120f971505fdfd5aa411ac8a99e894300fc2af3ce4fd179db6a20bd3ba61606daf47f2dd5bc262b0e799e38354c48d63da1540a8d8ccd0b33751e4903fa04f9c0d74b5e2120f999252798674fe57225c926527536f2d39f532c6addab2743808a4890ad8171ff64b285c2a36d9f80e0cdbe105edd505fbbef55199e61876ca4b"}, @ext_channel_switch={0x3c, 0x4, {0x0, 0x1f, 0xb4, 0x1}}, @fast_bss_trans={0x37, 0xbf, {0x3, 0x6, "0b97bc8508149c95d60297ddb5d9a42e", "99d9eab83f58de79c6a47988ca1ab54edb5f241392aa83e5f9a36ed39b961002", "264053519fcfc866c3e6136b728915ecdd704569a91909389c8b33ae4f0052cb", [{0x3, 0x1c, "960adf711806a6d2c56aab7e5c0fcddb58c151b059e216a79b0e3332"}, {0x3, 0x14, "bb25acede81c384ea58b81a59877df74ad5d1faa"}, {0x2, 0xc, "ec8849799833a646325bcb86"}, {0x3, 0x16, "d65126509c15cfd814e25b702b4f1601417c0798f807"}, {0x3, 0x8, "bedf45b0f4c58401"}, {0x2, 0x7, "2c99ae92e0dadd"}]}}, @peer_mgmt={0x75, 0x8, {0x1, 0x54c7, @val=0x1f, @val=0x31, @void}}, @perr={0x84, 0x42, {0x40, 0x4, [@ext={{}, @broadcast, 0x3, @broadcast, 0x3a}, @not_ext={{}, @device_a, 0xfffffff7, "", 0x4}, @not_ext={{}, @broadcast, 0x41d, "", 0x3f}, @ext={{}, @device_b, 0x458b, @broadcast, 0x1a}]}}]}, @NL80211_ATTR_IE={0x4}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x29c}, 0x1, 0x0, 0x0, 0x200000d0}, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00eeffffff0041bae3a46e7c6a2fcf00000000000000000000000000000000008f661634e159e796c804970002007a000000000000000000380002000000000000008f"], 0xaf2) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000002c0)) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x20d315) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0x9) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000540)=ANY=[@ANYBLOB="01000000010000001800bf009b3b1851ec2802412a19af70af88ca5d49843a619937d84cfd4346a16c476626281ca28e686ce3b88439615c3802a97f081100fdcde5ec7a4a4c8ee32c2d9af587a43f3ad65b98da6babdcf9e96d9a3ba30c7e093ec3ddefac928b30cbe619a5bccb2ca70737ca0267efc66c336358f2deef6bfac2a8c3c98d4f1481db206da3b49ab2eb78e8a79f9e20da7f78eefd64c3dd49e26a6ea9aea158185fbc0a025b99a1b464d9987523574a0a536332eb01ad27b5a5135b1d4851176ef0d3335e80ef25604f7178c7", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x2) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000200)=0x1000, &(0x7f0000000240)=0x2) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) mount$9p_fd(0x0, &(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), 0x10000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@version_L}, {@access_any}, {@uname={'uname', 0x3d, 'y\x00'}}, {@debug={'debug', 0x3d, 0x6}}, {@cache_fscache}, {@msize={'msize', 0x3d, 0x6}}, {@fscache}], [{@seclabel}, {@fsuuid={'fsuuid', 0x3d, {[0xa475dfe2e67aa310, 0x63, 0x36, 0x66, 0x31, 0x37, 0x62], 0x2d, [0x32, 0x62, 0x62, 0x34], 0x2d, [0x62, 0x0, 0x35, 0x30], 0x2d, [0x35, 0x38, 0x35, 0x36], 0x2d, [0x37, 0x32, 0xcad4b3d812b11b28, 0x39, 0x64, 0x32, 0x32, 0x36]}}}]}}) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e24, 0x61, @empty, 0x20}, 0x1c) [ 2168.235307] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted [ 2168.287061] 9pnet: Insufficient options for proto=fd 01:41:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x24801, 0xa0) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 01:41:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r1, 0xffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="01000100080000002e6266696c653100"]) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3800000000000000) 01:41:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 01:41:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00f8000000e1ffffff000000004000000000000000000000020000000000000000000038000200000000000000031e4ce00054fbf3f4ff81ecf96789b2871e3f1cbe516bf39c9dae54fe4b18ef1793bc9b95b445571639b5"], 0xaf2) close(r0) r1 = syz_open_dev$vcsa(&(0x7f0000000200), 0xc7, 0x200) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r2, 0xffff) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x7, 0x7f, 0x1b, 0x9, 0x0, 0x820, 0x566e2, 0x3844d298c53883e4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x40, 0x1, 0x20, 0x4, 0x10001, 0x6, 0xda, 0x0, 0x8, 0x0, 0x81}, 0x0, 0x1, r2, 0x8) 01:41:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 01:41:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000700001c00000000000003003e00000000000000000000000000400000000000070000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) creat(&(0x7f0000000140)='./file1\x00', 0x80) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004dc80)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004de80)={0xffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x2, "38028f37227086"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000447c0)={{0x0, 0x0, 0x9, 0xca0d, 0x80, 0x5, 0xffffffff, 0x81, 0x9, 0x24b4, 0x6, 0x7ff, 0x8, 0x0, 0x8a3}}) r8 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x911802, 0x140) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "7374bf600a2dbb0a10a4446998c60bc654676f080ecee8672b9b990319e9f34b4c45be9b1cbb8fbe1f4541599e2a8deeedad6067575d671432b4ba4028542704ab850b2cd326bd5a16431e3e06cbefba068d34f999e863befaed31fe2f898bdfe4043148f4d1cc27af274cc202dd9cd92b1891ba85c4048baa5cf0aa7a3d5dbef19adb89a7123a5c5cf1f42650df4c63aa25c0c5f606a072b8c1910206999409a39439cacd824f129adb4177e14f533050e77cfd6b9e760c12899b047feb4c8e5b746e5570db48fc8fafeccf98bad6d99a585091b403666ded97ce43cdf6dd1791052bc149861ea2585dfb28b538cc9fe6ffc5e07182615951fd668085ed124af574a07e3495491f19b1aa2a3b69028ccacd78524d988b224ab17ed905da0b840b4a9939e2af6efdf4221126075a8964d904883db014031e0924681a4ef3795071b256b75002a7df298c87c565b1d8a331e7d0c1000e1d707100917dfe107f87ebea9dca1b708b01cacf1c9f348c0d0fd64aa64193637c7169264d06f613c41be60f39b0cc9d813ae5fca2222832f86f2ae87e883efd48df36d16e6c1ca5c378f6ff0fbace91eb3099d744b16171fcc1ab7d5456392f0878ecf27e8caad7386663de490c3044eed7e7cb83e675716eda0cc09f219aadddd814c88048a7c6cefe69a79f2f7a234cfffbf19ac7a9f6ef59faf2776ac3d636904ec1bda09b1c9d8caeafa918983215d866f5cb6f1088e7e99a43425913d258a3dc8550fcbca3e0bec47503e24d709dd1fd1bb3cd92837d10387a0eebb98aab27950a2a66dc0b9bad3e4ef6393036d64949931ffe6479073790b3b885ac8563d4018e9227d644864c17f048daefbb192d15b56a2a440ad6d4ef5af2ac9904d8b69c64d2368928d7595594e6c3fd23229cb6aa80ec308301b1c94777900d34b1b3eea03dca765036a3f5351551affb585f22541074380b60ca062bf8a8a2324fe61ecad5733aec51e0c5ddc648280556b8a038b5816947b1637ef598cfd134cf9833d875fd23d22f5f74e74a4634d50a3ac908eed128f4297924296d95361b9504c08df4a0603eff93ee34bd45ed12e8d06b8f399fefef4ced732aad15b70f3e276101fa4b5a5c17435d0999b3345ccfe853c955e8b7927c7a171506b8e5b4de8a68cb5e80c3709a0e15643b5772d82d04859133e09fa8ab81ac042e67bc918f2847af14a4eb77c3fcac3132ec1af5a57d85acb9ce91d9d15019904396737ade63df938e6f054f8ee21e8994d45b0801ccd8ae8bda90128cb05eddd297d800412bc01fc5cfdfa9d473641fffc793b513da3f7565a27c4ff3678ac6f71560cc6cc95fb4d20f85b7934cb4a4f614182d331ab53b6a09ff47fc272b6c1f5aaca477bfdfed3fac942d639773b7a5656c526eb595d6fa9d301c425947f37088447cb4400c37750b76eb6c1f7933e43b27224c2fdc053e55125d00ab11428af674f58bd5c3ea1ce4762856afccbd37dd59a5e726f2e5e770bcc8372304fc2a33611234e3b0d411fcae8691e621b64581dc32b3d97c02920877b2c995018dcfff2da8687bc64332cffc3d355931561dc799d169f61d121f242dd3605e3fef8a46bf73998202d6a87671719896c61d729006104bdb7e926020f28260c75c2c754e5f073097d7031567e62cbfcbff541702cdaf498bbfe01e2948e6e164271ca4ab4df68a1569d29d3ce7029c0b58d2a1e6d179fa817ec9df17195c8b83a7a7508f18f0e3d07e8871f331d7a151bc11301c7dce402e6a5fda6f3096df2ddfeb48b3991e055c55d2a071ed66bf378e5c451f849cdbd7951cacad16d6b5734b71db866e77086bfab1797942633ec688d78bb2fccaae2b0e796b852b278bd4a4648d0811293e1bfe68e30b42eb27ac0a4e435e086b4cfeeb9fa539f0d800b6108e4c7b9d7237746770a3f3477646b7c9bfd2bc111679d40bffe221be492ba984df6cd4d7d8f9cbf7185e79804416be68d8a2bfa28e5bec4b57bf5f08eeecafabccd55744e49bb4a7dd1324908d91762b9884e7268d0bb6290be3b51091ae6ccf2ebbd4945dd7913bd38509a00ce38d955909bfa1f3740fc123a12e15b853b59b9b691460afdcda150d39e566a83eaa0c3b7bac9819bdbc7e0a620206be87ff2f8ea8091dbffa014d2f2eb919040a434cdeb3db68adf845d2ba751dc0e1ce4afd8672a5ecf0653b8c672c3265aa236a174185f4b4a291bda664bb79c13f8b6932a831385773898d194d2500b38fbfff8c4acafa5a80dfd3f1f906132885446f9f7ad787dbbdab593661ab1c255df879eaf4ca739deaa11379a5c6b650472257fa54b646b29ceb3dbe27e3584914f9f766bbbcc67abeffebb0df881a42b8671bba930b04d1d7710cc15d546ee69ad40e66f04eb28af8bd17b739e68ad75a239303fb97b18f8f08d2f95bdae0f245ebdfc3ecf555a6fd53f5a35af8b2dd016b227d209fc8323a7576e66a9913a0ad4f19d30d2b6f25ac8b5b6c762e2c68c76f9bd7818adbb3c9b194c09471482ec6898754469076b8674ab9e26b5977a0fa693160f18a01d2f2c362186ff75c205cec261d9e6c431ee672e4056b7e458ef02dca1167d09de5977210461758ed506290477a63c5af0698a1f4edf3bc569692bc9febd5fd641860dd34a6926af47ae7bdd3cce59a5b24b6944075e30ec2f2dbd043ebc57a39eaa5559bc4f21f08198e0daa2e8506b21160c8f9b629ad0e80d5e99e5cf4c4ceefb8d9fe5493ebcb066a647269fef2146f1ed55dac66974446e650e49db26ceb24c16c24885a2d2d011d11ec52d5b7a9c8096314d1dc7c992a1dee70be2fc0cc2d9fc94b0d02d479f6f4bfd3fa20df42568e27c0cea6caa1028d5dfbe6a9657053c06132387f9abfbaf93d9b335b69b168bf7fdaa0a44981dadc3358b50f1b24d390f8858d6775fa838388ff8a69b02bf446028485ba9e0c15731288c186b3cdf2fbc088f13f50e5eecc9b3a058d1369b7a254f11aa81a5fabd862bfd5226ce26e0199ef241badd55ba0d6087e9eb1661111a6afef1caf2bd54832bb5a3e8b864c8af220a8a115746c1646e78471ba2edb7c63fcff7f6be047a5f740525fbe5e259beee146dc2a609d3fd576e826ee1e4fce8ccbf75aa713514bda04ed4086cdd11a770cbe5782bca23f5f3ad8682609d5c5d4e5ca4e117d7423740b41081c6945b446223bb435c6ae2314552b7bf53a8b2c8a7a2a961d17315e0f7a660624b119c89ae81d2214b03cd79bc3eb355bf06811d7186b1f0a7219dd8d4096cb0df940719279357b853bc7c5bcf645aa65c12227859ce0851953fcefa6051f2a31e3666abde9ef1ece3eba658de696edf5d87a7d562dfe1f6bb9ac5e6773bc9069c732683715868cf14825345fb60665982549b9bb7c5b7d934ed0c4d136fa089f8459d473bf1ee678cf88c26f4f5ac681aa6dbe6ef78c26e7a3649ae0574f550f9fc64e8caa14586cbc43d8ec72a3170fc4f6c78fdbd40332c1f35adfc04be68a067f2c03325d624e21fa0e1fa6ea879caa84665bedefcd19759872824a0053a110af2b6099d8ea572b0c81cea39147bb2dca0eaefd4be8c3b59b98c27049f04ae5f3652ade0e1561238296d17979581b93d0ee26464fb5675b968cbc397558207fb1d5365f73994c0c8f2bcae0164e74d602a4856355b214af58b6357b2505779260ec73929eb4fe1047bbc2a125ff6c88718d2b8b8fb9c0d1cb1760748ffc5e4998dbaf8fad99df26b2eaf99bce2541d287b243d7b9cf0ecb25588d14c6228a6cb5413f48e3d07817d258c45ca0ab3494ca5b59f87abdf38e439b4a31d60d9474a52e465f36dd0cd56f00d4e5e563bfc6421b40a7522eb71894a698c19510fa7dc690b6b3f782d88e61ca635d5efd4c9c1725dbf24e0c8e246a2dc979e4750de8347687038f0441858bdf5a06bcba827d8d1327601943ca9fd004c121034fa6e1c8b9eff5da764961f5700eab97380e99b37f302239b528b36f5c9bbebaff25edae48fbe59dd272099af5c695a19b62f64485ba01ae8416c02f04360be933b8ba8a49c6c1188a78c3d36d0c61f61b4002bfeb669e29bbcb306f573528a749b085500c7649aea469fca867da4ca9eaecc75a70f41baeb80bf803402a9066dc1e8243192b78533e0ad590e14fd2bf2ce3ac943ade1fcefd247406785ee387d18e9afe8845481748fbadf4d081e01ecce50ef1fc5b457fa296b833d77390764e2af12f7930c6334476dc4cf45d9f272e364336810c11318bd0a95233005d66fe81a5708ae5fad8c7db17e6d97d2340651f7aa7a36e132a77a7a6206b36a95ccb5a48cb19bd3bb886ff0e77bc76653912149ca85895c4f80c373cbbd4305a91213e8ec5b7b18d8587d723c18f02854556aaaa540935eab2b7470a7c1c40c7e843ac1221a51e92eb05af2342fea7c853a46182c8384612aadb40145b95de565140003468eaca74b38bdf4dc640d0af80c3dd81747652c5fe15ffff8965a150a4ca6a9d9c91d067b4fac49b23cd2041dfdab22126c97d812b67ed638cc65d75d836bf439807cd7cd3cd0e6b30c81983e3f45a00282a14d401d81ac7c5544510dc7d157eeaa18b09df5ec949a22d7342b5b720b2a47251e995410f9b35d90824c1b19beb8575c9efe2aaa2a2011790a1099a924c01ca835fb7cc561eb2310a5331d4d9c4a9ee03a5f1364c17a7f4511c0c1b929c630cc110696f9e94b4107d0b75338fda2c5e0b8d46d19b98071e328f57debd56b4a0a9009913ac41518a08e6fa533edf20db0dc5eff43cd3ead623fc826ac03925490537d6b6a47f27031faa17f9852a3cb72d2088f33d35846a40758e60dab4b3980d032adc3e4faa61ff8aaea6b08bc9705cf097701e9af550fa43ec06c0ae2257927eebcbbbf4a05ad8097597943d6aed8a950ba32bc0d19827539019397e2fffa5f7379ffd7ec266f0c1cd947aab0c9e73c2796bd4c32fa0a0effbc84570efdebd3ac1eb57cc89cdbed91ed43a64cccfeba427a017a07d84acc850a45e2f26639598ed061ea81b60fb1873983591d446129ba8b27a4aef3311292017e3cbc00533824888ef80ef1a85c86a370dc11694d2f455e04ceb8811afa53aac77c65b38703d18167aedcc077c988dd9832ee1999a82c8752b921bceae484c19cee6828eef373c979b5c3f208080c8dcb38c53e384bebed6c41c3b9d6958bd2b952d82d17b262dbf30f90ab5c5d197ccee9f6b6525928b0100ffdeace644e159500495ff5a0ea7df7b9ab63617e3879818e25341e97d839beefdf248222cadd61a5d76b1ff34704bb78656afef7994904da269f973598217edc3be93157185aa15ef225f6471d7786a5e28d0f145b96566e101bf46723486867b9aa90f9eb4d1f5612d4950160c1504a367daf984"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r8, 0xd000943e, &(0x7f0000002e00)={0x0, r9, "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", "b9d690d4c2961ba074993f97883bbb51b06f89c141451f13c1686f72e7bb65611977d6002f1431a186d5f2257905101ea7db2e6bf671a3e2ed5c4c1cf42d097b8893be887075c80354674bdd2f853ea656cb3e9245682a7535e47e9e33e85ae5ead9fe58a43b6180f842f9bb0e5c89e1caa699b0c3888c739ad76bb1399a08942950638961e9282155065c9da934de6c54a7c6de7c13ad473d79343726178f0005f1703b58b1d2770d74e7f48248ed1a53012481b8ae94631bbb47d5eb3f61daeb0abc31a776f716df06283f33b2dd3d09cac605b177a3cc1d4498615031856dea664a24d81b6afebe4663081f7e9b81c9dd78e525d9a2183320554bdf31172da25718a139d54cc1d378c388fbc9af80a6819af15b01f391f498f30e8996447b58681ca5f987e32b82c4459509768aae64bde6ec834906f2f41b33a2aa27db2d152cd1abb397184377f755195abf7126378f78e5231a3035ba87908d190e9e0ea1a1044d9d51ec44fc71bdf55f9dc4829f31839ebf0d5c8dc37f16e88aa64e7038236fcca31298ce05459eb4dd0494978c8e49363f0e47e32d771af403764b83b2db9908de8c18ca108272ba2f1516e0c1e46369c964bd90841d7546111e93c1fc3ff9b7116843a85d4d39de4d4a14be19dd959ef04b3c0be8645ba57e0654640dc83521316f9f1cc52d36ebf0d1a3f9870aa75d4daf969217c0c266e2676eb4167471b37c2d58352179ac9890ee713427a1b99491537f8432217775965a4a4546311730980950db1a166f7646e68b2e03b2d0e005acc526660fa94f6b41bce75cba25cfb082f93ff7ed991e75724f52ff8a71bfe7b632e4b66de51704d01d2bfcc7633b7c3ebba4cef91e18c8d5604f7e2a624592bd64adad6be4a5b1c4fedefa7631b3b3f0afe363b6a590ed9bc5f64c668f663e47f5862a526193e2e6801d2a4a16baac07129c4a78544a7a421ca24ff16ddf7109024eae8f20a6a389fa00b9bf3d07a42be5b5d37dd883a29bff5e6796f0bd3f9ddcde80c8ff737956df3e0e7c67f788186c9112450204da5c72a90cd3a6b235deb6dc95fa645c037fd2a8eaf845000f1f27a406ffb545afcf81c1b53af52a61119173f0694e97d7f2c95c3ee3d3600a896a5e8b5b61aa28749853100c36c9a83cd56e1fb277c0a7cc5376954ed6a9fc6fab836dca17c8ce06c285c5d49f4aa9529b2c604d3879508d9ff2aa182bab953378055d79f5e1e0b350c3ad97b9bf3c6fcfb03dc207a8ae0d50b9b79bcf5bcc76e8e772f200ed1c3b72629be063b5fdb9e3a3fe975850b8c8c9db221d1242fe568a6c7e7f6bbc53540db7aca23039d5dc3ccc23da056e591850bd43533e0a305d4efec06c848043670c99323c5efc1500b9a835ea65632af10c3782d76293cfd86be1231e7ddc770eed6bcd58b2a605cffc99082c39067b25e02584a6dc853f4ea8c65f08b494711a60948d4d610f65ccb0abc17c45c66343917e01aef20693a5baefc12a489ce2ecb0e339d382c3ac479552c3e600dfb07dd9a51c462e673848589b9b559e68924bc5db803dac23589202c3443030fa303cbad9fa36871c780188bda60ce5c868c1c1c69363acbdfe14b8aa27d4ef8c3b2bf896f4c4c851c88d4beac6ad384e8e3a3c536b887bd408929d4ef61b426c2fd823cf1dc0b01337f6f9db9197b5cdc2081bc86594ddf9f9303b41d96397708c707f0a7f10ddac7891810bc642f3cd43b967cfe8a598d0c8950bfb69a41136444145061063f011edc4e31c5eda7a53fef0e8589e123ea0dac55e963385b25fc3f72b17b6e4125eae186c47125d77b34898c82f16f2854d8f419c57557fae571e6c1a1953ca55053a4a8183299a00e86262a1f915f16b32a46f843ab8c09dc1f2c12bbf5fa1ca0adc19d8a797c5ebda3c2326e579c3f86446ef24ee9500b2a2e764f4afd3c63dbb437f3709c2fa75e0cab2fe7013f061e92e0a747926f4a3bdbb311dffaa66c4b74768724405897f1700d47f08a32b8d708e9efb6a9d3e6de01ae2b0d1a242327744b3160a180ee41073f15ee8a4bd0b5966d3235928c911055b61fbc5e0913f722d713699bbcf457823dd342ca139cf1a1c4841becdceeaa2da94721f6ab7016546b07d7ded6a922e72b7a4e1e77318edcbd068e2b3b62a331cc7cb0b75b0553cf76531dc169f4105b3d0afd7bae71ee83beae4902217ccd0cc99560b8354fcb6abdd405dc4da00f1bf2b054d56b2c76a06f3f2b66d8ffe2bda6e9a24d078843b0a1050a759359d15cfe02df8171247d0dad8b3e1d4d1cc66001d48ab8b554937b3efb584f64a9524bc47f882fd35d6a388f32bf88608c1d9235b30ff1e05f7f48fe8f936a46e9086a96c1457d32c2a70feddbb362a06693094d9799b4ed193c6b8e63997c03ca6ff2cdfbe310e4e658a0a47775a3b4908144d2eca581f2cd9845aee90c9650e9279c61c288e298d4f3e86e51c5e6daa5b80a31c7329f1698a98a76733086c061c79dd16e8dea8e58c09f7e3ff73992fd7c1069586c1a2978650e4c5acf97a6984ed3c3790319f53aa4e6c32a60b40ae0fcd7633db2ee798949679bcf6abd215e5108933683eb11b25c44cb7d8aa02d5114433053115b046c3b42fea105091e8e2fc1bc2c638360e195f0069a7842d0b94610dfaf8e3dc2a71f5e8461fc53e4b8514ffc84d5f9d10a3d87950460b03a5a2b490d7614c4d533b10ed0976549386f1233bc55445f08a389b631323b2f7412f8347d42b74f89e370689d68453fc16e0a553bbbef25f4736dab5ddd5cf9873de8e63208f91f84c0aa90a41513a55b02ad2c64b9ede488016088ecf68b7be09cb4daae41cd3f5ed4497a7f92922e7ecc25b54222517547fda1836a3d2d047d9e7375c8de88a20da5dd1bd0dee18827d404ab3647e2b7eadf0ed24071ed4c38b6edf4f37fd71c3dfc5d7c0a3cc61da852632aaaa5f7c67b7b2b1debb7bc479bdb8c0a4fc53d2f6b2816c75c935c514940383fcd8e61989c9348e8598cdc307bc1bfec4e7cd3ce98b4b10c53245bd236e114832bcd2b2cafa13ade0cdd642dc0a1c51ad55d4d0b399c74eb5b9ad0ae6039661df9624b7fe14be4104e0c0e4e391b2cb91d5ea24bd75c642acb4bb7ce79457ff6374cd4386406e11de3cb75924c87de1c39c664948a87fe9c96b61cb192d979ad65ca38dc7ceef929c363ad74216894e2df74bbde33f75a5f088060c254e9075b9bf3bf0ff1f5e4274632f5428501c5634cebe74e8e84593ff6f3b930dedd813171abff6d986656719346829628a928d797dbd9d5758324bdcb4d184e2550435fc77c526fe131e4cbddd02390c3606ca4f1ed350e6f24f5a1912c3e8ca963795d78cdafbb883bc7850743dcef5ec560a19829988b0101a18533192472c8ba9573655186d8f93dab7436b3e866b323c877b0debb94a5f918c6ad778a958c11aa684159386ecd95e13068d64afe0f748ca6611acd4fdc1c8ed2c143051ccc68ecd8e570e2033d7d5c7ab5339e8887cf564f95b58a96ef8365757fe02f6a5a9dc7caa11fb035aeb80f93910776570bce2287137a8f0e002dfdc9c138bcd5e3439c514813d3c481cdbd9b9143afd4e55d2d749e533348e3625e819f9b62b6a09f67011f3c11dbc1fc2fb70d43fd306eb7c3c34a6acb743e32f70a96a6ebdda8c5d58d9175b061e6e60c11a446c8f8eaea3af19194abb1342aac645e6ffea26ce915bed753628cfc10b85feebe20bc1b2cd9323bf17fbd5165479863f8cbf4c3537096f97ae1836a1fd3e20720555d29b6bf88e33c6dc4d556b9b5b0fcd180c9265e732db8a5370fd107047e69bf2661082bfa2d7e889396d45d4dd3b537844e47b44a24d2a359e31504e86f9d8380ee8c552b45c93f8ac7ee79afaf1115c569ac42821cc0e23a481a516252e40de01c1fa8ad17ee1af9d213a36b3e61a5d69071dc1bf96efa7049e44e3bc5cf76f5f10ffca9bfea6fbb10e5e878e74912292a555364c1628ba74fd480425d153dbf3e8eaba0c773c09c63b088c66d2a059019e865398d73373863275cba6e341b1d464da8a5024d53f469313514a215092de1e235d6e55094adb72851f29753b273b4325c629abe91f1115540bf4397ff0f899c6e5ade3b6f0813b7d6eadef69ef4adec2b0872c34067168ecd9f3f1f7e8abd7d067705459c4ef6ba128785d49da4e125cb506062b7046bf5829820bce66899ea6594b7dd3a10cf5e696481a0a48659aef94c73cd5da45b84aa47f184105c3b73ffba8cdc9238c87362b0638777d8f932240350d855982350d0fed9ed798a01c677fa06505ce88fc3540c41796fb55b2d184d26b6aec69cd8c70f8edaec335eddd8e22aa1fdad286d60adbc75d199e88094f92a4c096b3aa55a00227c7f885d06594cb087b97f54734419cde371115e3c7f88a41c71475650f11de31b1a0e50d2aee0c8d601d5c216dcd65841e9ee7b0f56d42a2899781005a9e18e0a1a63031b436b9eac9a53ed410c5df330d86db75d5fa8b599af9d3b0ab27d81bad447ba7379cc8e3325274d22a071e5f8185974e86ea80bb106d079a32e70f774770a8e06d492a3c2ffb325244561565168f185631c9186279a9b7616e6dd5d5da567e9ca35e2c76550c7c42f76a17856e13a12fb0ce2e6ea91778f722923ad451840ff57a541bbf60f65792a555f589903ea922db0a5788ef3e3bced0137c1790dae0d1f674d1fda0091eba1b126ad126bcabfa4092eab6a2cc59b921d0fcec24b4b363b02b1ba0c7641758c17ace4306c8ba805a3713adb818b92f7de728b73ca11833a5868e79e8ccb2b949cc6ed6a011b0e5d8c5edb288122cbaa9fb42f6a7b0443de741846b5dfd95ca057f6f6bbc958e1becc1aef6f48fe146607797808c0f2461c86ed2bfcc202c497c520b1acd81a8563288c09d2378e6882374286ef15fa4baabf53f8906ebdf8cb95b5d4a9f83b4cda697f5145b4111865d399094550f28de3cdfacce53fae435d01b5c3ec42435414c2b8a617cc675691cea5c0e6e19ea72962023883399821a209bf084aea0966caa815b4730a7b6afbb2760c3ef19dc4f7b27882a2afc332264182e8660f574cf66beb0a7d7e6c2685f9b2aabd7ea74ebf6e85fb4d92e5390e527087469b447d6a3e538a0f949992568ae19a5dca6e42200fa9c187b4114ee7041febfb29253eab777f1f96652993e2a42ba1c99d6fe8e73fa700c8d5a9902c584c39f1045394e8c79e6450111a8ea6a08a637644165f3b0b7c9298de9d71688fc56cf91a2f2ec5953b09ad342863c5b5b84bcbab28fd2453e1521bb7f9a535589f9470dd9109928ee98c82187ec392bd23cfef0d0b468046082beba9915224b3d6d9d1a3084fed9c73847c826ab905ca837098240cc6ddd140ebdb3f0"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000457c0)={{0x0, 0x7fff, 0x5, 0x1, 0x40, 0xf8, 0x9, 0x81, 0x1, 0xfffffe01, 0x1000, 0x1f, 0x2, 0x40, 0xf778}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000467c0)={0x0, 0x0, "abde348d730c427e59eac85eb5528d0e76efe346870ae91aa1775294710434e946de909a7812d0127eedf0518668bf519a1fa1213db80ac8453e956fc4c87f560adcb5c01c8c8a11bdb53d0069c7dcd58165fe1fc41f321e5536c20e45e08837dfbcbe4c1d65964157f75cbdae84d0b53f50e0d5bbe73401b18596b357bdb89ed5abe2786756dfcd530b90baf567ff44f1a3dd7dbd2c2677c0b61c6182ea562f60f5e762e7121776a9d57a83614469583c0b785f55125cfc62ff7134fd4d2e0dd0760db51efc1c2979974ec6fc4ec106418f8a296933685a339aafef78b752fdffeb9e01136b19c6053723a4ec1dd31624ed6889664b83b085f6270eeca1e76a", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000477c0)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {r7}, {}, {0x0, r10}, {r13}, {0x0, r14}], 0x1f, "7b9175e1ff3c4e"}) write$binfmt_elf64(r0, &(0x7f0000001140)=ANY=[@ANYBLOB="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"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x5, 0x3, 0x8, 0x0, 0x9, 0x8400, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x7f, 0x3f}, 0x180, 0x2d59, 0xfffff000, 0x3, 0xfffffffffffffffa, 0x3, 0x9, 0x0, 0x100, 0x0, 0x5}, r2, 0xffffffffffffffff, r1, 0x2) 01:41:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f01010000000000000000000000000003003e0000000000000000000000000040000000000000000000000200006693d5ea0000000038000200000000000000032281747f813f3bea3c2a9d85c41fae2bba8967907b2c2c6109"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = signalfd(r1, &(0x7f00000000c0)={[0x5]}, 0x8) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r4, 0x80489439, &(0x7f0000000100)) ioctl$BTRFS_IOC_RM_DEV(r2, 0x5000940b, &(0x7f0000000940)={{r3}, "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"}) 01:41:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000000000000003003e000000000000000000000000044000000000000000000000020000000000000000002038000218d2b222a9ef9fa4b557463f00"], 0xaf2) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f00000000c0)={0x1, 0x2, 0x800}) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x2000, 0x44) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 01:41:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 01:41:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 01:41:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) r1 = openat2(r0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)={0x270200, 0x120, 0x2}, 0x18) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/12]) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r5 = accept$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000200)=0x1c) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000280)={0x4, 0x0, &(0x7f0000000240)=[r2, r0, r3, r0, r4, r0, r5, r0]}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat(r0, &(0x7f00000000c0)='./file1\x00', 0x1810c1, 0x102) r2 = open(&(0x7f0000000340)='./file1\x00', 0x4e201, 0xca) openat(r2, &(0x7f0000000380)='./file1\x00', 0x240040, 0x4) preadv(r1, &(0x7f0000000300)=[{&(0x7f0000000100)=""/46, 0x2e}, {&(0x7f00000001c0)=""/41, 0x29}, {&(0x7f0000000200)=""/232, 0xe8}], 0x3, 0xffffff01, 0x637) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="8d454c4608ad69bcb7b20ea05200000000ff01000000000000000000e40000000000003e000000000038000200000010000000669c00"/65], 0xaf2) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r3, 0xffff) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r4, 0xee01}}, './file1\x00'}) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e0000aedea29a000000000000004000000000000000000000020000009c0000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x50, 0x27, 0x100, 0x70bd2a, 0x25dfdbfd, {0x20}, [@nested={0x20, 0x5, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @fd=r0}, @typed={0x14, 0x35, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, @typed={0xc, 0xd, 0x0, 0x0, @u64=0x8}, @typed={0x10, 0x32, 0x0, 0x0, @binary="df3274c5ca9a78bbb90d392b"}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) dup3(r2, r1, 0x80000) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 01:41:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x7ff}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000001980)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) openat(r2, &(0x7f0000001a00)='./file1\x00', 0x5c500, 0x101) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000001940)=0x1) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46200000070000dc0c80330000000000000000004000000000000000000000020000000000000000000038000200000000000000035acea25a00"], 0xaf2) fstat(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x1, 0x8, &(0x7f00000006c0)=[{&(0x7f00000001c0)="5a329e38c05e087063622c3ac659056e5e7d61b121bfdb347fd6ca406bb7b2741f784fb2c5b6436ac62007ffbea3d0d001d740f67549ec1f5c6c5c5e9a0ca370f1d1403d7e9ac0b1936ef73c179a158291c6ba6af52ea17cf7bfbc5077df8a6048922ab85c2d75a1e7037ef8053a76a9ea94e4823d16feaa111fabd200", 0x7d, 0x2}, {&(0x7f0000000240)="06969ddf135ac5d990b9cc039c8a12d94d727a61839b8fa1a52549a89d735c9066ae90185dc30ed2acbb3c8dfb562a33696ca95b562ae053765495492f489b41dfb88071eed61482688dc2b24a2961e76e29f5e39695b9a254c40e8c4c50f8b8b36d9460ea2455947333569eae0a490d2f5710a5da8f2d7b41c69def090344a0855d17b899d202f9c9105e1b5ea4f1ec3bc6c4a3534b676238103b76e9bf0398e41ab2f4feac4e646c37cd7b6c427b11ba1c2ffc7f50a10701e24da3d338471f16cba09c72633c138f", 0xc9, 0x6}, {&(0x7f0000000340)="eba4d5e7ad71940342c410c832bcb2366b08ac5ca6bfb0983410b24ae204d959b12c5dba4c3634848193fec8458c8aae5d64ff78f5383b8cb9a52db3b37b2ab883715ca2d2b14c39724d65ed0255988610e9671f5585619eef906ed2bfce7b7bac0b8e7d3cc4", 0x66, 0x5b}, {&(0x7f00000003c0)="4dd0fbb5bdc4ca81f5b48dd0fdb7c907086dbe4c89785581f14a01371df0801e3a6d05b2e9df15d36c2647926ab238dc90912e81804f1a9026cea390beb9efbfc413574c2d83de31a5b470cdd038a1b1deeacd53f50d83551bcb8af5be95dd26d84a58eec787dac423bd1b16990ba6e8cc9db325a2588a8767", 0x79, 0x9}, {&(0x7f0000000440)="3169015b5c7949737557759a2b64b71548aedfcebb02c0e13b110d16be490847c7c5f4143849daac5b5c48326e46946ed3f6463d2c3270001b4fe784d1c332b69e0ff59723db5436f3275164ffa0868200f749835be45296d5995d151e84f4b8a8534423f011caed64d387d0f7b4bdc08eb4b2655fde11d6d97e79f1b665e986d7a821ac7581babd99e67fda92f7911bb664cea5c6dc709d82c9a4e8ab3fdf930e9e0a9d5fe43d2e11aa1705d4a803596cace76635856eb679926fef30de0ec8423e2247df435dec3ce20a318b15e4222930bcb2a3586331a8f949bafc19d3e390976b3f42cb21", 0xe7}, {&(0x7f0000000540)="f6c59502403c855c417d19e7cba762ea045f9b3a32130fc7ad1ffb9a8ebc0781b51917887aa736eca6c4b43cf464a32fa9589ba6c597678d05b9aa4c702974633af4828d89976784b03de56b97bf1c2e492c52eda83a3cd980d56c521d63f0143e4471bb3ff216747c5b37d575f53737e7a599cb98e6f5bf2165266dfd74802e8b5aa44d282bd062a6cd3029e34f03b366f42c96610e0c1f8eaa0be930c4d4bb3f42380405dcf9acb53f3e2de448201f823f781b63469bff17fc5727f7589c2669981680fbad70103077a05f1004072a408a6a561406bcbbe60da6090041aeff5a89744ecd9f83a3", 0xe8, 0xfffffffffffffffb}, {&(0x7f0000000940)="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", 0x1000, 0x10001}, {&(0x7f0000000640)="1deed4ed3906ed0c4f79df0393bede46bfdde8214760101708eeb5ad2de820874145ac5c1204ac07fad6f78a5f987224a21d2cb5232f11453fdf6088044af2f1110fff0ca6e21538f5c363f47fc2d8277e1826", 0x53, 0x1f}], 0x200c8a0, &(0x7f0000001a40)={[{@fat=@flush}, {@uni_xlate}, {@uni_xlateno}, {@nonumtail}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}, {@smackfsroot={'smackfsroot', 0x3d, 'fowner>'}}, {@euid_lt={'euid<', r3}}, {@fowner_gt}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]\\['}}, {@fowner_gt={'fowner>', r3}}]}) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 01:41:41 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)={0x182, 0x1, 0x20}, 0x18) r1 = openat(r0, &(0x7f00000001c0)='./file1\x00', 0x301840, 0x1d0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000007000000000005000000000000000000000000000000000000400000000000000000000400000000000000bc1e5db19ef5802a931b4f6bc8228c6953fff773cc10551b29b2c4c7259fab882fa0c6f30e2cb435118ad78e8cfba7d19b99afc058c513e66a6240b401f597cc81eca60b1a"], 0xaf2) close(r1) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:41 executing program 0: setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0x8, 0x3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:41 executing program 4: ppoll(&(0x7f00000000c0), 0x0, &(0x7f0000000100), &(0x7f0000000180)={[0x7f]}, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46010000070000000000000000030050"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003ca3520d1f89df92f469afb32441dd811a537713c54f61cce81bd84e6fe0c454e8809a54c677c8c43c9469f7e9e2337933e621b27b374d685ff78a7e669a6013c4dcb761e9feb6e0f004efc0dea"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x10000, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000100)='.\x00', 0x408440, 0x4) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setxattr$security_evm(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), &(0x7f0000000200)=@ng={0x4, 0x3, 'Y'}, 0x3, 0x0) copy_file_range(r0, 0x0, r1, &(0x7f00000000c0)=0x6, 0x10000, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000240), 0x0) 01:41:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) fchmodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x4) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x80000) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000001800), 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000001840)) recvmsg$unix(r0, &(0x7f00000016c0)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000001600)=[{&(0x7f0000000280)=""/210, 0xd2}, {&(0x7f0000000380)=""/165, 0xa5}, {&(0x7f0000000440)=""/209, 0xd1}, {&(0x7f0000000540)=""/179, 0xb3}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x5, &(0x7f0000001680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x38}, 0x8000) fcntl$lock(r1, 0x7, &(0x7f0000001700)={0x0, 0x5, 0x5, 0x2a, r4}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(r3, &(0x7f0000001740)=@x25, &(0x7f00000017c0)=0x80, 0x800) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 01:41:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20d315) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x80000c, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_L}, {@posixacl}, {@version_9p2000}, {@debug}, {@version_L}, {@loose}], [{@obj_user={'obj_user', 0x3d, '[!#\xc5*-#'}}, {@seclabel}, {@seclabel}, {@obj_role={'obj_role', 0x3d, '?}'}}, {@hash}, {@dont_appraise}, {@measure}, {@pcr={'pcr', 0x3d, 0x36}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x32, 0x36, 0x35, 0x36, 0x34, 0x31, 0x35], 0x2d, [0x39, 0x38, 0x64, 0x38], 0x2d, [0x33, 0x35, 0x52, 0x34], 0x2d, [0x33, 0x38, 0x66, 0x31], 0x2d, [0x66, 0x33, 0x64, 0x36, 0x35, 0x63, 0x39, 0x33]}}}]}}) 01:41:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 01:41:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 01:41:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) pread64(r0, &(0x7f00000001c0)=""/140, 0x8c, 0x7) 01:41:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xc0, 0x0, 0x2, 0x7, 0x0, 0xd88, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x9, 0x9}, 0x202, 0x80000001, 0x4, 0x8, 0x1, 0x3, 0x7, 0x0, 0xffffffff, 0x0, 0x6}, 0x0, 0x8, r1, 0x1) r2 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x1, 0x8, 0x2b, 0x80, 0x0, 0x5, 0x48022, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1ff80000, 0x6, @perf_bp={&(0x7f00000001c0), 0x1}, 0x8, 0x7, 0x15, 0x4, 0x1000, 0x7, 0x1ff, 0x0, 0x400, 0x0, 0x20000000000}, r2, 0x10, 0xffffffffffffffff, 0xa) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000fc9400"/69], 0xaf2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20d315) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f00000001c0)='@\x00', 0x0, 0xffffffffffffffff) close(r0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x511080, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r5, 0x7001) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r5, 0x7003) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x18, r6, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet6(r0, &(0x7f0000000d80)=[{{&(0x7f0000000140)={0xa, 0x4e23, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x40}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000180)="e36fc928587a613690e2b2f18d7fc8b11d223ffdcb05fc97058684eca9116000240443d813e1a9975a4c0153d5e36773b65491a894dccc0cf6", 0x39}], 0x1, &(0x7f0000000300)=[@dstopts={{0xc0, 0x29, 0x37, {0xff, 0x14, '\x00', [@hao={0xc9, 0x10, @empty}, @ra={0x5, 0x2, 0xf001}, @calipso={0x7, 0x38, {0x2, 0xc, 0x3f, 0x7ff, [0xc45, 0x4751, 0x800, 0x0, 0x93a, 0x8]}}, @generic={0x7, 0x4c, "8e6c7e97eb9443bf11f08998aaaef1ff85ac42f72d93b97bdf96641b95d1aaa372e01a1b33b333779bb0ca4fd1a1fd31817e14b7c3a447a5457e4d9f9038fdb396efedd4aec49f7184fac140"}, @ra={0x5, 0x2, 0x81}]}}}], 0xc0}}, {{&(0x7f00000003c0)={0xa, 0x4e23, 0x2, @loopback, 0x7}, 0x1c, &(0x7f00000007c0)=[{&(0x7f0000000400)="28c76ec4a269ba843ea77f7622b6e10a593dbb7d088d350ba77b2a0bed528f6a64867d35d7ecad492ed753bd5d1d5035da349242d32dd1e26fd5a6364952ec32a69ced10c15d9fc41872f3b2d843f9ee1023b2e034d1328451bfa87fc1444b6d90c4b646c56022bad79b095007b2677c09a23755d15a14b1c8054b32c38cdeb0a17f94be949ea46d15dd5afc7580164cca7dcd32130f011aeac96666f8d9e161bcbc4442ff1208c8048e55b1c44aa781", 0xb0}, {&(0x7f00000004c0)="8ca7cd17d05b61a2c8244e36320fdc43c54f6f647c27eb065da7f4b475c1", 0x1e}, {&(0x7f0000000500)="6629f0436f42cdb91239f9e3424f9e1081e1b475395b2ccc3d668e1b2cc096f3b26bce51d648beb82be9", 0x2a}, {&(0x7f0000000540)="902691c68ff332b9a966618b76c9b49b80fac8c86eff0a540b1c6dc6e117f7d0fb0940388f51b6a59eee47af9180e859f6130614805d3c69e349d23085f5f5e7c8896e86678dbf06bac19b55bc007a1a198ab7900b0159fdb797784a23be1680d05c964ffdfa8affb3f539617336d8ec5876d368055eeec0d3320fd68b9e10", 0x7f}, {&(0x7f00000005c0)="5b5914322892729da57fc5dfb49308f24a1225473949e2e950c0982ac8f46fbab7974626f7929d00ed8d8e6c5d68f2cf30ca54f1d8284094c7a107ada810375512b109480321b68339b1d41a4abceea3fe3a5b25db03df8c4b0493f7517a690c0230fe82c523fc6791194f56393b74d3b409cd6f21f4d046c00ffd787ea4c46a44e5b1f17a93cd755272a6c9ba839b25f83b6901d34dd4dc19940212797feb519bc5", 0xa2}, {&(0x7f0000000680)="1f0ccec0b46b269544708b413deb2640a4794cb3e721167ba99922bd0530640feb5c33d5eabd1e01a8ad29c68beea2291280842a040c6c284189de2c204a8f3f007c2db92f2c2e18533c4d65248508a1062abfe28bf1de9b5e698d4ebf164f8cc613908f2c27c1794520ac75892bf7a2fd39a9e7f76bf786518018b3a8b2", 0x7e}, {&(0x7f0000000700)="3d94c294b9873beca74fee88c9cb77b63a1dc132d8fcfc211e389590ed0fc87431919b790884b74a478d276dc5ba11096ce846c59084bcc950ad379ddec93ab95ddb02cb1adfc1ce489b201231186d8e89625f6bfab113f580b7d3c7129674b049820b0bb67fa26fc2511112fc824cdc359699a0a8d9d996c7617467a0e529bf5331830e4977d36eaa15b8c4b63d5fc0ecc5e0f9ad4f69e4e2800d22f1615f9cd0468a19753c423b3f8dd428", 0xac}], 0x7, &(0x7f0000000840)=[@hopopts_2292={{0x38, 0x29, 0x36, {0x3b, 0x3, '\x00', [@hao={0xc9, 0x10, @mcast2}, @enc_lim={0x4, 0x1, 0xab}, @pad1, @enc_lim={0x4, 0x1, 0x6}]}}}, @dstopts_2292={{0x40, 0x29, 0x4, {0x2f, 0x4, '\x00', [@enc_lim={0x4, 0x1, 0x82}, @ra={0x5, 0x2, 0x9}, @hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0x81}, @jumbo={0xc2, 0x4, 0x7}]}}}, @rthdr_2292={{0x58, 0x29, 0x39, {0x57, 0x8, 0x0, 0x7, 0x0, [@empty, @mcast1, @rand_addr=' \x01\x00', @private2]}}}, @dstopts={{0x120, 0x29, 0x37, {0x3b, 0x20, '\x00', [@pad1, @generic={0x8, 0xef, "dbcf9ca740682718191221eda3e63ba0ed4d84a712680ba54518c4bb9abf5de518121da3ae9c9af6e2d43188ff32673829aa0a8f77f0eed7571a05c5b18127b9ebbeb444102312b95f8fdac5d5021b5bffa3035f6f486ebbf295c83ac59bd08c7ce8084b9f3517069af13d7aac46b6477c615c287ede3050e68adeb89789db92135630e290558891f4e106a6847286194e1509cdfc860588c86039b7c77a5957526e30af927512b34740f3fad717a08b9e74f018dc9e5fc1db686fa09eb9721ab6df278ca759908a8783d1b42f76d3332c3d15a3e4d17f3323c6566b951a218040fc7ee1e9d90a1020279b7e0959f4"}, @hao={0xc9, 0x10, @empty}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r6}}}, @rthdr={{0x48, 0x29, 0x39, {0x29, 0x6, 0x0, 0x4, 0x0, [@mcast2, @mcast2, @mcast1]}}}, @rthdrdstopts={{0xa8, 0x29, 0x37, {0x21, 0x11, '\x00', [@calipso={0x7, 0x40, {0x0, 0xe, 0x8, 0xf34c, [0x7f, 0x5, 0x3, 0xc70f, 0x5a6, 0x1, 0x0]}}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @jumbo={0xc2, 0x4, 0x800}, @generic={0x40, 0x1d, "b424f578f28480404f021488e6c2c54a510c013695e1561ed8ecc6cd70"}, @pad1, @jumbo={0xc2, 0x4, 0x81}, @jumbo={0xc2, 0x4, 0x7fff}, @jumbo={0xc2, 0x4, 0x4}]}}}, @hopopts_2292={{0x1f0, 0x29, 0x36, {0x1d, 0x3a, '\x00', [@generic={0x8, 0xcb, "c2a38107ad21cc61845a1a33a364ce79d89f892d6513fdeda85a5bb0d994a6eec0caf19d48cf19936f33910a665d5169ab02f1120890eae0ccf0e943e4c2e9f452c72617a46e7f486313d72787665c941bd71ae72d3c7745810c761b68eaef0f2ca896c37706b303609505d58dd8dce6d5d8c8ce30d0cb0e9b272c593127386405c39254724baf423291a26c53bd3c80bf7592bcd4206b2fea2695fa4bb52d48e33001cf3e91ace39a151ac399529fa61d73b0cbf04872446a0b8c28e8094530adc8bd4a563443cfc36878"}, @ra={0x5, 0x2, 0x7fff}, @jumbo={0xc2, 0x4, 0x9}, @generic={0x20, 0xfe, "fc7b98dafe61a0391a82b4828dff37aae1517056edacae032b60514e4b54cf4e229872e12eb1dcb38be95e2f66b12d1afe807686796db152c2f701c9c5597bef165d2ccd81ade489c61e362c07ef62f6f8d3f2ac415273cfeb99aed883572fddb854ec448e05cffa089732e77b30b0b6ee2f23a0e4655928c12fcd660352b583aaf54ec79f35033f8e1a01431fc8ab2a092019a34db44d7b54ebc51fc917a5a66912e2892393a6b0a1451c6f407d57cb84b86727a3661e42282fbeea54492bf1ad9fdd71038c5fc14f4974c507b64ceaf913d58efde9543a504db4936f5b1878e75b600011d6b9c0b87074e6d42d6c1aba921f0ea859612013e024741ce8"}]}}}, @tclass={{0x14, 0x29, 0x43, 0x6}}], 0x510}}], 0x2, 0x20000040) dup2(r3, r5) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f00000000c0)='\'^-\x00', 0x0, r4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e66b3707c5b2ad710d7bb1b54bf800044955638"], 0xaf2) signalfd4(r0, &(0x7f0000000100)={[0xfffffffffffffff8]}, 0x8, 0x800) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0xfd, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1140100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000020000000003003e00000000000000000000000000400000000000000000ffff01000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 01:41:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000000) 01:41:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000340)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000180)=""/179, 0xb3}, {&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000240)=""/82, 0x52}, {&(0x7f00000002c0)=""/84, 0x54}], 0x4) 01:41:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000070000000003003e0000000000000000000000000040000000000000000000400200000000000000000000380002000000000000000300000000"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:41:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) [ 2213.686384] audit: type=1400 audit(1722130915.478:14): avc: denied { read } for pid=111844 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 01:41:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_SEND={0x1a, 0x3, 0x0, r2, 0x0, &(0x7f00000001c0)="2f59332535b06a88e87261dbc0c4c0e9cb8b19a552d51ca6f946b0074571924328766375a3e3f1a0db957fb79c088cc39dbfea116f859880bb858dee697f6ed93c56d77ad5966b41c38188fe4358ae0d596a2cf95317b10a35a673779212185876756a793dc491263476ba19e67d4dfc5dcebaa0ace212d3ba382fcdd623bfe8eebdb24509c386a079fbd6d65b484b180b8393d472b18f50dcf15e1dcd6f5cbe572cc0494679195ad75deeed95e6f468a7bc707d6e6e51c920238476acaedae7121d00adb4f1f01ff6604485349417a8c8e7e293fd", 0xd5, 0x4890, 0x1}, 0x5) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000100)='./file1\x00', &(0x7f00000002c0)=""/139, 0x8b) fcntl$lock(r0, 0x7, &(0x7f0000000380)={0x1, 0x2, 0x7, 0x1, r1}) 01:41:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c0700000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x240, 0x0) mq_timedreceive(r1, &(0x7f0000000180)=""/109, 0x6d, 0x100000000000, 0x0) 01:41:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xfc, 0x0, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x20}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7fffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x6}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x10000080}, 0x40000) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) write(r0, &(0x7f0000000200), 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x82, @private0, 0x2a}, 0x1c) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) finit_module(r3, &(0x7f00000000c0)='!\x00', 0x3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x7, 0x2010, r0, 0x0) write(r1, &(0x7f0000000940)="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", 0x1000) 01:41:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 01:42:10 executing program 1: perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x95, 0x3, 0x5e, 0x40, 0x0, 0x1, 0x84888, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000100), 0xc}, 0xccda43ef1c0475ef, 0xfffffffffffffffc, 0x40000008, 0x1, 0x9, 0x380000, 0x5, 0x0, 0x40000007, 0x0, 0x7fe}, 0x0, 0x3, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000100000000000400000000000000000000002000000000000000002003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) perf_event_open(&(0x7f0000000500)={0x7, 0x80, 0x1, 0x7, 0xd1, 0x20, 0x0, 0x1, 0x100, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf5, 0x3, @perf_bp={&(0x7f0000000080), 0xb}, 0x14800, 0x4, 0x79, 0x1, 0x5, 0xc57, 0x7, 0x0, 0x4, 0x0, 0x80000000}, 0x0, 0x8, r0, 0x8) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = eventfd2(0xffffff7f, 0x80800) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f00000001c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x1, 0x5d41, 0xc60, 0x10000, 0x10001}) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) eventfd(0x5) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2a32bd1d1495f27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 01:42:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f45b2c20000000700000000b376ef4b71b2230000000003003e0000000000000000000000000040efe80d000000000000000200000000000f00000000380002004632467fd8ac3a524c537321692d81b6780c18eee48244c34cd7c392be5774a580c181de5fc5dfa00b5759d3e69d6b54db7b2a66173e78de20c36e79605d98689453023b87aa74352879864688fe42f31d69be70af2d66a64ee10f55b0e90b030449b3640866c2899bb0d5b2a31eb37918744d1dbdd1b1ad279a5f3b18683d73bc8ee671b0a25b1b91"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)=0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000004, 0x4000010, r0, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000280)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x1) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x0, 0x5, 0xfc, 0xfa, 0x0, 0x200, 0x6000, 0xa, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x100, 0x1, 0x3f, 0x5, 0x80000001, 0x3, 0x0, 0x0, 0x7, 0x0, 0x60e}, r2, 0xa, r1, 0x1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file1\x00', 0x3) 01:42:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x11008, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x800) 01:42:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 01:42:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESDEC=r1, @ANYRESHEX=r2, @ANYRESOCT], 0x512) close(r0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x80, 0x61, 0x3d, 0x40, 0x0, 0x7fffffff, 0x28024, 0x6, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x10, 0xcd, 0x401, 0x3, 0x4592, 0x0, 0xf76, 0x0, 0xfffffff7, 0x0, 0x4}, r2, 0x9, r1, 0x1) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x8, 0x0, 0x100}) 01:42:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 01:42:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000007000000000008000003003e850771b1af53cd37d94f39b9e5a2c8422a88581ab643e24d1bf6637eef3dfa50f38b2262b24e36d14cb3104d598ef9f997ec61c1f8ba0c74c37a9e477f46082b99c0e10d9bc1ad4ea798cf47196e7b22c4af61ad6f619f8e03f88c695f3ca86ed9bf8d255200658dc85a63ea629a5b607eaa3ca14ba55f07f8956b917045c7563e4c731ef1539f9a2f"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600ffff06000000000000000003003e0000000000000000000000000040000000000000000000005e8b0000000000000000003800060000000000000003b774bcd9785eca0cbab83a8b820f66ff6a2fdcd53847a30b15301b9756604b9cdc06e5287d14e4d1012fe0331493098fd33f890a7bfa0b7eb5839e1a329302a18232811097ed3eafb94a9788dbf9871b8982efa1346d130ad2000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20d315) ioctl$SNAPSHOT_ATOMIC_RESTORE(r2, 0x3304) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x800, 0x4) execveat(r3, &(0x7f0000000100)='./file1\x00', &(0x7f0000000300)=[&(0x7f0000000140)='}\x00', &(0x7f0000000180)='#*\x00', &(0x7f00000001c0)='-[)\x00', &(0x7f00000002c0)='@\x00'], &(0x7f0000000440)=[&(0x7f0000000340)='\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='@\f(\x00', &(0x7f0000000400)='\x00'], 0x1000) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000480)) 01:42:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 01:42:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(r1, 0x80049367, &(0x7f00000000c0)=0x4) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x40, 0x25) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000001c0)={0x1e6e7e1d, 0x800, 0xff, 0x1, 0x6}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) creat(&(0x7f0000000100)='./file1\x00', 0x82) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="455b41392af5829b2499253e7d3b88b467ddf4a88551d6b9cc44ee8df0456f181a6f63a79f6b53b956d7664db231e729a635ba2123ee36fea3ee2be4efec7ad82afd389f670aed66d1f035aece062d08873b0bbc3768bba6057e1b99b570913f8c2dd336fb2a694faa0aad8fbc29caaaed089bac5c925cc251db332e8d", @ANYRESOCT=r3, @ANYRESDEC=r1], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:11 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file1\x00'}) write$sndseq(r0, &(0x7f00000001c0)=[{0x6, 0x81, 0x20, 0xff, @tick=0x9, {0x7, 0x20}, {0x3, 0x7}, @raw8={"5f8a1900e29ee71a0619bf85"}}, {0x1f, 0x8, 0x5, 0x5, @tick=0x2, {0xb4, 0x7}, {0x6, 0x5}, @result={0x4, 0x7}}, {0xa8, 0x30, 0x3f, 0x3f, @time={0x5, 0x7}, {0x7f, 0x2}, {0xf0, 0x3f}, @connect={{0x8, 0x81}, {0x2b, 0x2e}}}, {0x1, 0xe1, 0xfd, 0x80, @tick=0xfffffff8, {0x5}, {0x1, 0xba}, @raw32={[0x40, 0x7fff, 0x1]}}, {0x0, 0x6, 0x20, 0xf9, @time={0x10000}, {0x1f, 0x20}, {0x5, 0x5}, @addr={0x11, 0x9}}, {0x80, 0x4, 0x1, 0x5, @time={0x200, 0xff}, {0x9, 0x9}, {0x5, 0x7f}, @raw8={"607741ea332c149100051103"}}, {0x0, 0x5, 0x1, 0xbd, @time={0x1000, 0x2}, {0x1, 0xff}, {0xf9, 0x9}, @raw8={"6da0a3410f5a19c013399f51"}}, {0xff, 0xff, 0x5, 0x8, @time={0x1, 0x7}, {0x1, 0x3}, {0x3, 0x6}, @quote={{0x3, 0x1}, 0xfff7, &(0x7f0000000180)={0x3f, 0x7f, 0x5, 0x0, @time={0x240, 0x1}, {0x83, 0x47}, {0x81, 0x40}, @time=@time={0x3f, 0x1}}}}, {0x8, 0x4, 0x7, 0x0, @time={0x1, 0x70a}, {0x4, 0x1}, {0x3, 0x1}, @addr={0x4, 0x80}}], 0xfc) close_range(r0, r0, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000002c0)={0x0, 0x0, {0x3, 0x1, 0x0, 0x1, 0x81}, 0x7}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000007000000000030000003003e0000008f000000000000000000400000000000000000100002000000000000000000003800d1653abb31625a9403dd9e231fc2300497d24b9aeda1dfc87ce9f440861e675f"], 0xaf2) close(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 01:42:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x52001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r1+10000000}}, 0xfffffffc) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x10, 0x1, 0xfffffffd}, &(0x7f00000a0000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r5+10000000}}, 0xfffffffc) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r6, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r7, 0x0, 0x0, 0x0, {0x1150}, 0x0, {0x0, r8}}, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000240)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r8}}, 0x9) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r9 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r9, 0xffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r9, @ANYBLOB="2c0080396e6e3d", @ANYRESHEX, @ANYBLOB=',loose,rootcontext=system_u,\x00']) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x80001) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000001c0)={{r1}, {@void, @actul_num={@void, 0x8000, 0x47}}}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x141000, 0x2a) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x10100, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000280)={0x2, @tick=0x1ff, 0x67, {0x8, 0x3f}, 0x8, 0x1, 0x3d}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r3, 0x80089419, &(0x7f0000000100)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x0) 01:42:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:24 executing program 7: r0 = fsmount(0xffffffffffffffff, 0x1, 0x95) getsockopt$inet6_mreq(r0, 0x29, 0x12, &(0x7f00000001c0)={@ipv4={""/10, ""/2, @loopback}}, &(0x7f0000000200)=0x14) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r1) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x4010, r1, 0x10000000) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r5}}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000100)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x8e1, &(0x7f00000000c0)=[r2, r1, r4], 0x3, 0x0, 0x0, {0x0, r5}}, 0x4375) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd(r1, &(0x7f00000000c0)={[0x936]}, 0x8) ioctl$RTC_UIE_ON(r2, 0x7003) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000100)={0x30, 0x12, 0x8, 0x8, 0x0, 0xfffffffb, 0x5, 0x55, 0x1}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 01:42:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000015d8a66c174a85d1ddc1a6a07700000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2243.262789] 9pnet: Insufficient options for proto=fd 01:42:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 01:42:25 executing program 1: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r1, 0x800, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x86000, 0xaf) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 01:42:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat(r0, &(0x7f00000005c0)='./file1\x00', 0x0, 0x1a) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4600000807000000000000000003003e00ff070000000000000000005e0200000000000000000000020000000000caf24f99c897a61d966e862e6cb82d6ba7209654c937b99b29b02365071a0f7f75237a10533046a9f0c535c8e31b0747895a42e33dafa2516d5cef86ae3a35b3eaf1ce643c23313f6bf666d22c31b483472cc701055f0f669cb767ee50e3e209889c1757e25c8cba52cfc06972d1b174719dbb24f14026fd52b347748b62e328cdcd5b7f6aeb387aac9687e89ae04fbd2e9515949a2bc013939fea"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f00000000c0)) clone3(&(0x7f0000000740)={0x410e2380, 0x0, 0x0, 0x0, {0x13}, 0x0, 0x29, 0x0, 0x0}, 0x3c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {r1}}, './file1\x00'}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x440400, 0x0) renameat(r2, &(0x7f00000001c0)='./file1\x00', r3, &(0x7f0000000340)='./file1\x00') execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r4}, &(0x7f0000000040)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r5, 0x80049367, 0x0) write(r5, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000640)={0x4000000, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x22}, &(0x7f0000000440)=""/149, 0x95, &(0x7f0000000500)=""/187, &(0x7f0000000600)=[0x0, r4], 0x2, {r5}}, 0x58) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x2c4303, 0x0) r7 = syz_io_uring_complete(0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) 01:42:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x43c, 0x3f4, 0x800, 0x70bd26, 0x25dfdbfc, {0x1, 0x0, 0x26, [0x3, 0x2, 0x6, 0x2, 0x48000, 0x0, 0x4, 0xfff00, 0x562b, 0x3cef, 0x4, 0x0, 0x20, 0x2f15, 0x3, 0x3, 0x2, 0x1, 0x6, 0x41e, 0x5, 0x1f58, 0x8, 0x40, 0xfffffffc, 0x400, 0xffff3ef4, 0xc3d2, 0x6, 0x24, 0x7f, 0x2ade8e88, 0x4, 0x7fffffff, 0x3f, 0xa9839feb, 0xe935, 0x8000, 0xffffffff, 0xc0, 0xc0, 0x1, 0x9, 0x0, 0x3, 0x2, 0x4, 0x2, 0x9, 0xb3, 0x3e1, 0x3, 0x10000, 0x3, 0x2, 0x8, 0x7, 0x8000, 0x8, 0x1, 0x200, 0xfffff801, 0xfff, 0x5], [0x252fc0f4, 0x3f, 0x2, 0x5, 0x1, 0x2, 0x5, 0x4d6a, 0x4, 0x8000, 0x3, 0x2, 0x7, 0x5a3, 0xfffffff8, 0x7fff, 0x2d, 0x0, 0x8, 0x3, 0x0, 0x6, 0x0, 0x7f, 0x80000001, 0x73, 0x4, 0x112, 0x6139, 0x3, 0xffffff81, 0x8, 0x4, 0x1, 0x3, 0x80000001, 0xe7b8, 0x1, 0x9, 0xcc, 0x5, 0xc9, 0xffff, 0x7, 0x9, 0x0, 0x2, 0x2, 0xb64e, 0x6, 0x234, 0x40, 0x0, 0x4, 0x3, 0x1, 0x1, 0xe3, 0x3, 0x4, 0xf, 0x1f, 0x1], [0x101, 0x1, 0x1, 0x2, 0x5, 0x5, 0x7f, 0x30, 0x0, 0x7, 0x9, 0x69, 0x7, 0x0, 0x7fff, 0x400, 0x9, 0x6, 0x7, 0x1f, 0x9, 0x2518, 0x401, 0x8, 0x4, 0x4d4, 0x7ff, 0xfffffff7, 0x4, 0x4a5, 0xffffffff, 0xfffffc00, 0x8, 0xfffffff7, 0x0, 0x80000000, 0x3, 0x0, 0x6, 0x100, 0x3ff, 0x0, 0x567, 0xe6, 0x4, 0x1ff, 0x6, 0x9, 0x3, 0x101, 0x6, 0x0, 0x1, 0x3, 0x8, 0x2, 0x5, 0x6, 0x80000000, 0x2, 0x7, 0x1, 0xffffff26, 0x5], [0x4, 0x5, 0x800, 0x1, 0x2, 0x80000000, 0xfff, 0x1, 0x0, 0x8, 0x7fff, 0x8, 0x2, 0x4, 0xffff, 0xffff, 0xfffffa1c, 0x0, 0x195, 0xffffffff, 0x3, 0x0, 0x6, 0x0, 0x7, 0x8, 0x6, 0x39e, 0x8, 0x81, 0x6, 0x101, 0x1000, 0x3ff, 0x7a9e, 0x9, 0x3833, 0x4, 0x1, 0xff, 0x400, 0x4, 0x0, 0x943, 0xc6f1, 0x4, 0x7, 0x4, 0xe803, 0xdd, 0x401, 0x4, 0x401, 0x800, 0x7, 0x7, 0x10001, 0x8, 0x3a1, 0x7fffffff, 0x5, 0x20, 0x8001, 0x9], 0x1b, ['(\\@\x00', '%\x00', '*-\'-\'\b(p][)+!^+}*%,,\x00']}, [""]}, 0x43c}, 0x1, 0x0, 0x0, 0x44810}, 0x0) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000009000000000000000000003800020003000000000000"], 0xaf2) close(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x5eb2000000000000, 0x3, 0x100000000, 0x9}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000100)={0x1d, 0x2d, 0x5, 0x1, 0x9, 0x4, 0x4, 0x145, 0xffffffffffffffff}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x80, 0x4, 0x8, 0xd, 0x0, 0x8, 0x800, 0x86f4a8e0dbc1e6fa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000000c0), 0x1}, 0x200, 0xcf6, 0x40, 0x2, 0x0, 0x99, 0x1, 0x0, 0x8000, 0x0, 0x10001}, 0x0, 0xc, r1, 0x2) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000700000000000000000300000000000000000000400000f0a2744abf0000400000000000000000000002000000000000000000003800020000000000000003d5f60f41c1820308b4e76527405e55e5071fa964ba8ac2582efe07aba0b890f4d9011c2cae460f"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x100) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 01:42:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) finit_module(r1, &(0x7f00000003c0)='-({\a&+/{-\x00', 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) close(r2) readv(r3, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/72, 0x48}, {&(0x7f0000000240)=""/253, 0xfd}, {&(0x7f0000000340)=""/94, 0x5e}], 0x3) ioctl$RTC_AIE_ON(r3, 0x7001) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) mount(&(0x7f0000000100)=@filename='./file1\x00', &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='omfs\x00', 0x40, &(0x7f0000000200)='/dev/rtc0\x00') r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRES32=r1], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xaf2) close(r0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r2, 0xffff) openat(r2, &(0x7f0000000140)='./file1\x00', 0x10000, 0x68) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000002c0)) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000100)=0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0xd06}, 0x0, 0x9}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 01:42:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000180)=""/186, &(0x7f00000000c0)=0xba) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000a23f6563bbed80981970000000003800020000000000000003398e7b6525033ce28ced8f99b46676419278bf87fe2084ffeedfd8947a2b89a13b5435c462a240acb16ab4d4871783fc6929fc1416e96bef1d3ed6a00270ee805c2bd2490000000000"], 0xaf2) close(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) readv(r1, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/17, 0x11}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f00000002c0)=""/34, 0x22}, {&(0x7f0000000300)=""/237, 0xed}, {&(0x7f0000000400)=""/63, 0x3f}], 0x5) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454e46000000070000f8ffffffffff02a590b1003e"], 0xaf2) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f00000000c0)) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4102a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000140)) 01:42:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_io_uring_complete(0x0) openat$cgroup_ro(r1, &(0x7f0000000a00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x0, 0x7, &(0x7f00000006c0)=[{&(0x7f00000001c0)="d7b23a3fc472b25255b9ffac2a5c028c8d5c68230c59d5e0f2539598e701ab7442b896998c80b03ebc45e01768f14627f9c4ba59d368a5e954ca6e7c510dc4bb04f460129f4738c1b1df089bc9571d4ae63893e4887f9e87a2b73caafe89efe1e2de15564124c3a3216d5acdbb85bf427f5430ef91f3759aeb5a6cb0360527ab9d3da3b2ac37085e05230f81fbaf2a92a1f12323e148f5c7455e461ccd9fa44bfbb9b7892a4031b2e0f6a69cfd2b8d6c304affdd98aaa6bbc9514c7084f8576bef8f", 0xc2, 0x3}, {&(0x7f00000002c0)="c9099e5bd05fb2874bfb907e6953ea212b2c68d8ce0be8ea4d16f966e5aee1386f17433d44ca23247535fe488bf93ac11fc067872ded71d2c20ddb237ae7c0a43ee4ec5c881cd958e21d911cf634e24171b50266bc7f1a74bef5c9629b55b758fa1d0e9c15ee76a1dc4cd652a2761d11c108452f859b0e4fd84b4b537e851952b73653c52e841f42bd04680223648f1e6b53043be4dac308513d591b0896c9f436dbd899d9181f5e011f4ac82ab53fb8f3089ad805441d86bfaaa1851affad306c94e32c17d6f8d8d9ee11e14720", 0xce, 0xfffffffffffffffb}, {&(0x7f00000003c0)="c17d97038ac4b7b27769ad1298e2adba282d1284f2c02646ed514a0cfe3402e4effb2a2315545f48a7e8b95a5adc688b500fdde82f7bb718e5e78b6e7b8aa19bca93c01d9a255315a1ae546cbd541f1bd797a8ad2aa998021ceae81c045819fb18ce8bd6e98dacc76a94404632d7ba559998e1a6c57b31a51eedd74f62a4", 0x7e, 0xfe}, {&(0x7f0000000440)="0f09df58500e815c052b44c8661b6e2f52d16233255c4509308c2020cd19520fe4f99a7ccb5b52f51f7e03c52b673fc48f0d67907d5786a6", 0x38, 0x5}, {&(0x7f0000000480)="b476b9491e187d603e71681f717449b3f1e8891d8acec2da454e5bd7f59babca78697284980b718b1e2c3ee240197d0a2a0453779ee8e5f1f1d3dbec39ec8e591a08d181a76d3910f4da64fa117b8b0a633e552ea5581021d18f9c064268c51683ca675bab18c783f34464442c19b509c9fa3401546a90600313298db38f956784161e08f60d6a2bb5333cbbb7e4ffe31b1b5bfff5713a5cf86a16904e32d76ada4ae21290841930e5852c63ce686f93336891bbe0b1cb2a2e2644284bdfee863e6a73e7f676aa3203a437f1242f6f1af82331350bc028dd8d44", 0xda, 0xfff}, {&(0x7f0000000580)="40797762a1102c5502551f15a44c49a5185ae453893f67f14111a04ee12785344b4b7cdadfa380493eef0e18bf0f96b72bfe217e3adf58e526153bd6e409a841843b996bd7c8bbef3824cced4e41967a348dde3bf6272c7c162e8c6dfb9043570baef2ad1476101598f1a1eeb1bdaa273dd4aca81debb8e3b5376b9793a12d328b0a7ef1ea3af0ed9e26", 0x8a, 0x58}, {&(0x7f0000000640)="f0ccc711cb24eecd9ed008762aa0953896a737fbec027cc571dc8726b5ef78afe4faa976b1d3bf41a8b695928408128d53e8172197281540f2feb1c89b2d1e8eb91c14d58056", 0x46, 0x1}], 0x80000, &(0x7f0000000a40)={[{@numtail}, {@shortname_lower}, {@utf8}]}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc2c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4600000007000000002000000003003e000000000000000000000000004000000000000000000000020000000000dfd70689ac9ec655040d73d31849375ce81ec8abc902afb5aee16979802ac08754957f67a6c6fc64d52fa9665fd85ab618759966d1e63034d67ddb19c9f5f0434f8d4f1bc05354893cb793716a050b424883872f6ad0aea06753ac5760e46244c0d7071da4bbad8d4d5255c3f098879a58c692790178b326f1a37354ee3f83b0dd4ec848d6fa0bfa85aa115f35e6d63f095a3ca006339ca84a7bc20b45571ceab148715415459059969d1924c8787f76d5748796c3690c457328b9ac"], 0xaf2) creat(&(0x7f00000000c0)='./file1\x00', 0x112) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 01:42:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) openat$incfs(r0, &(0x7f00000000c0)='.pending_reads\x00', 0x220000, 0x3) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000000038000200000000000000031c8d6a87b94b7705ea8066b258c2926c28d6a0"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000140)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a000000000000) 01:42:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:58 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), &(0x7f0000000180)='system_u:object_r:systemd_systemctl_exec_t:s0\x00', 0x2e, 0x1) 01:42:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 01:42:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x81, 0x0, 0x1, 0x81, 0x0, 0x1, 0x210, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x400000, 0x2, @perf_bp={&(0x7f0000000200), 0x4}, 0x800, 0x6, 0x5, 0xdb009946500d0406, 0x2, 0xfffffff9, 0x7fff, 0x0, 0x1, 0x0, 0x5}, 0x0, 0x10, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x8, 0x2002) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x1, 0xf, 0x3, 0x1b, 0x8, 0x5, 0x4, 0x121, 0x1}) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) fcntl$dupfd(r1, 0x0, r2) clone3(&(0x7f0000000140)={0x1040100, 0x0, 0x0, 0x0, {0x17}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) 01:42:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x6b13de5e33ec5cb3, r0, 0x10000000) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r2}}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000000c0)=@IORING_OP_POLL_ADD={0x6, 0x7, 0x0, @fd, 0x0, 0x0, 0x0, {0x5500}, 0x0, {0x0, r2}}, 0x5) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 01:42:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20d315) openat(r3, &(0x7f0000000100)='./file1\x00', 0x200440, 0x20) write(r1, &(0x7f0000000240)="01", 0x1) r4 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4}, './file1\x00'}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:42:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r2) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x20, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy2\x00'}]}, 0x20}}, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000001c37a817c11b84ec", @ANYRES32=r0, @ANYBLOB="02000000000000002e2f66696c653100"]) execveat(r4, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000) 01:42:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x1}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x8000) 01:42:58 executing program 1: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0)=0x6, &(0x7f0000000100)=0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x80040, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x800, 0x60) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46000000070000000000000000000040000000000000000000000000000000000000080003001ed3aa67680d2b679dbc3690a09890abd9c7dcbcdc360d967d0905cfab90b8c3a82de7deed392876cba8520de81665524e67c2cb24394b74878c35b2d9be2b9c077a0e0cf5fcf4b072dd4b4dd38c33e289af2182690571ada4f7f0ba472d31de493085c538026293ad544bc43d2e49370a6bbcfda10d4a146b1ab192c38a821f12ad0517aebb7a4787fa245d6e696a4412c60d"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 01:43:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0x3) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000140)={0xc, 0x1d, 0x7, 0x13, 0x2, 0x400, 0x3, 0xf9, 0xffffffffffffffff}) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x80, 0x0, &(0x7f0000000300)=[@acquire_done, @dead_binder_done, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000240)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="0000000000000000000000008561646600000000030000000000000001000000000000001100000000000000852a646600000000", @ANYRES32, @ANYBLOB="000000000000001c00000000"], &(0x7f00000002c0)={0x0, 0x18, 0x38}}}, @release={0x40046306, 0x2}, @increfs_done={0x40106308, 0x2}], 0x72, 0x0, &(0x7f0000000380)="15588f9ceb3e205b3b1c2c36a8f196616fb44ced4922adea8e7b4488bf1cce6669bf70b3c4ce0e2e7d07a60bf22b41111b06cb0344019ec23589dc35e8eba09c121c4d3c937441845f96955d8831f13050d67cf539e316bf0c6dbdc99ef3c5c298b55ebae0e11a0d9e3e701619962c52b28f"}) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x4000, 0x0, 0x0, 0x8f6}) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES64=r0], 0xaf2) close(r0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r3, &(0x7f00000000c0)='.:[[\x00', 0x1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x1}}, './file1\x00'}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x8}}, './file1\x00'}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 01:43:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = openat(r0, &(0x7f00000000c0)='./file1\x00', 0x34801, 0x40) ftruncate(r1, 0x8) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000001f0000000000400000000000000000000002000000000000001d000000000000030000000000001400e034230ba6c1f73ef6c026d93ae156d71a707c9120bbff385b4ee6be26bc0791ce02274e3f902d97fc349cd8c9524f3fc4e390d82c2cf5c854e703b30211e47b2f4341e651362eca3e2429476d9b9d84b6ad"], 0xaf2) ioctl$CDROMVOLREAD(r0, 0x5313, &(0x7f0000000100)) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x6237, &(0x7f00000002c0)={0x0, 0xffffff}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r5+10000000}}, 0xfffffffc) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r6, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(r8, r9, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r10+10000000}}, 0xfffffffc) syz_io_uring_submit(r8, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0xa, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f00000001c0)=@IORING_OP_POLL_REMOVE={0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r7}}, 0x80) 01:43:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003ee7f7ffffffffffff00000000004000000000000000fd0000020000000e8c3b7e60b42d057be6b0767339900000000000000038000200006200000000000000ff26a720530f04e854c7e0789bacf19bf83060e4d2613e36c33d9bde93fdf92f8de33fb0c34f842b5ddd6985c023d45154987f9a92b2849665e24fcb726a81ec32cd83c68dfd69fbbe3041b9a0"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x12}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x7f, 0x20, 0x81, 0x0, 0x5, 0x20, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x2, 0x9c}, 0x142, 0x5, 0x100, 0x2, 0x8, 0x20, 0xd87a, 0x0, 0x0, 0x0, 0x9}, r1, 0x5, r2, 0x8) 01:43:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x1}}, './file1\x00'}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x8, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000980)=ANY=[@ANYBLOB="7472616e733d7463702c000072863d30783030303030303030303030303465c2a71120ebe978b3d242d232302c756e4cfa0000000000007273696f6e3d3970323030302c6f626a5f747970653d7b7b5e242c7569643e906bbd76efd5da0d988de98657ec4f3f2219a9d02d9ccec17f83c0bb7ab377c0e0e6263137fbe9dbc266c6cc1a690e74dc4e4b1b4f05e84a79c526012271fc3632178e3f83406254f48ae5dbc4dab7", @ANYRESDEC=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYBLOB="2c687973782c3065726d69745f646972656374696f2c61707072616973652c61707072616973652c6f0b5b4b568a6c47e3f4f156b258a15faf198ecd636ccd118ff2908eb6dec3d0066da8250403002adc7c85710a89a43ff6dc4ccde43d88ad566b74802839970900961c57c8ed3e930c72d9520e06e2305700000000000000000000000000000045d3b9639f4a6c42af4e8b5c42011dfe95cfd4c1b17e253f0459bad51c1c2896d2ff2f8c218e5fd4d48bb980968c7bcb0900e68362b38cb0b0513627319f50a6"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x1000000, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}, {@access_any}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@seclabel}, {@uid_lt={'uid<', 0xee01}}, {@fsname={'fsname', 0x3d, '@+'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@seclabel}, {@fowner_eq={'fowner', 0x3d, r3}}, {@smackfstransmute}]}}) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x81062100, 0x0, 0x0, 0x0, {0x16}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000400)=""/111, 0x6f) 01:43:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) 01:43:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f51010000000000) 01:43:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600bb934d3897507ed4a3000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x80080, 0x32) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x8, 0x7, 0xa1, 0x3f, 0x0, 0x5, 0x800, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x9}, 0x1814, 0x7ff, 0x2, 0x9, 0x80, 0x2, 0x71, 0x0, 0x5, 0x0, 0x2}, 0xffffffffffffffff, 0xf, r1, 0x9) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)}, 0xfffffffc) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r5, 0x0, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, 0x80800, 0x1}, 0x8b) [ 2291.901517] 9pnet: p9_fd_create_tcp (119023): problem connecting socket to 127.0.0.1 [ 2291.912443] 9pnet: Insufficient options for proto=fd 01:43:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x9f) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000180)={0x1f, 0xa, 0x10, 0x6, 0x1, 0xd07d, 0x2, 0x44, 0x1}) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) close(r3) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x3, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0)="ab7ddabd360013347803bb87d7169c3e3070dcdc4e2124bdb11896604f4a98dace19fd11fd392bcb84a4853074667d38407354fe49a6afee1dff0bb0cdf9db23081d39069c023c32581e343aad76ce39d22ace2452d371cb73be2ad3e09f6cb75eb764dcf205b813f0a2358a95727b214093437fe3532953ecd017ec5e00680ded294c6f5a1884e4d098008a467ede488c20bf6c24648167dc5c5e44abe0b238d97352d8e151ebbe39ee07d3c8e67559d194cead67c2adce0a56b7c990559ef32e947c91bb22c4", 0xc7) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f61f8454c4600000007000000000000000003003e0000000000000000000000000040000000000000000100000200000000000000000000380002000000000000060099f45c664043b5c068081371233341c8a53eb0ec7edae02cf26dd10a493c781ccce19eadd2c4ebcc7b28a5ac85198c04041a15081b94762f19ea994f5a47"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20d315) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x18, r3, 0x1, 0x0, 0x6, @local}, 0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20d315) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x0, [0x3f, 0x9, 0x8001]}, &(0x7f0000000240)=0x44) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={@empty, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x5, 0x7, 0x7, 0x500, 0x3abf, 0x40000000, r3}) 01:43:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000060000000000000000004000000000000000000000020000000000000000ffff3708020000000000000003"], 0xaf2) close(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) lseek(r1, 0x2, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 0: sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080027bd7000fbdbdf25020000000c0001002e292bcf4e2e5b00"], 0x20}, 0x1, 0x0, 0x0, 0x4010}, 0x20000000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0xff, 0x0, 0x0, 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 01:43:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f00000000) 01:43:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r0, 0x5, 0x7, 0x1f}) clone3(&(0x7f00000001c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 01:43:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 01:43:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20d315) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x5, 0x0, r3, &(0x7f0000000100)={0x40000012}, r1, 0x1, 0x0, 0x1}, 0xcfc) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) pidfd_getfd(0xffffffffffffffff, r1, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000000000000004000000000000000000000020000000000000000000038000200000000000000038cbeb4822182d86a84db42568dd5bfffee6d6204a9d22afb327b4e911189a9d8e23e0c489d64fec99ba91e540d9fa67dcdad2b285d51358064fbbe7cf2b3a3238d255cb5e2a05f913b9e5f6ecf1ee7f3ab650c8e801fe2f0d127827206d4f5d0ad4ff05f272ae6b3aef3bcd87bc8c6695780f22148ea929fc2fddef2e434ea56e05660dd53b31156e2d29e72eca1728966"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)={0x9, 0x8001, 0x6, 0x9, 0x7fffffff}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20d315) openat(r3, &(0x7f00000001c0)='./file1\x00', 0x80400, 0x180) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f0000000100)=0x4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:28 executing program 7: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) fcntl$setlease(r0, 0x400, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59002, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0xee00, 0xffffffffffffffff}}, './file1\x00'}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r3, 0x7003) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000980)=ANY=[@ANYBLOB="7472616e733d7463702c706f72863d3078303030303030303030303030346532302c756e616d653d7b2c76657273696f6e3d3970323030302c6f626a5f747970653d7b7b5e242c7569643e906bbd76efd5da0d988de98657ec4f3f2219a9d02d9ccec17f83c0bb7ab377c0e466263137fbe9dbc266c6cc1a690e74dc4e4b1b4f05e84a79c526012271fc3632178e3f83406254f48ae5dbc4dab7432f4f0638b5fcfb3d6aa8", @ANYRESDEC=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r5, @ANYBLOB="2c687973782c3065726d69745f646972656374696f2c61707072616973652c61707072616973652c6f0b5b4b568a6c47e3f4f156b258a15faf198ecd636ccd118ff2908eb6dec3d0066da8250403002adc7c85710a89a43ff6dc4ccde43d88ad566b74802839970900961c57c8ed3e930c72d9520e06e2305700000000000000000000000000000045d3b9639f4a6c42af4e8b5c42011dfe95cfd4c1b17e253f0459bad51c1c2896d2ff2f8c218e5fd4d48bb980968c7bcb0900e68362b38cb0b0513627319f50a6"]) r6 = getuid() r7 = getgid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) statx(r0, &(0x7f0000000240)='./file1\x00', 0x4000, 0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000380), 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000400)=""/124, 0x7c}, {&(0x7f0000000480)=""/144, 0x90}, {&(0x7f0000000540)=""/128, 0x80}, {&(0x7f00000005c0)=""/211, 0xd3}, {&(0x7f00000006c0)=""/22, 0x16}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000700)=""/136, 0x88}], 0x7, &(0x7f0000001940)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x128}, 0x41) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000001a80)={{}, {0x1, 0x2}, [{0x2, 0x0, r2}, {0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x3, r4}, {0x2, 0x0, r5}, {0x2, 0x4, r6}, {0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x1, 0xee01}], {0x4, 0x3}, [{0x8, 0x3, r7}, {0x8, 0x1, r8}, {0x8, 0x4, r9}], {}, {0x20, 0x7}}, 0x74, 0x2) 01:43:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 01:43:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x400100, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x50, &(0x7f00000063c0), &(0x7f0000006400)=0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) 01:43:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f45005f1af210030000000000000000000000000000004000000000000000d4337021000000000000f13a8305003d4a00712dc07c414f64f9352aa04c155c43fd77ba01c80bc89d84de8fb8dea9056051ece1c52e6acf5871aa861bffffe4ab7b74dc95b2b17d1c26ca938fab3e420cd77f86e2b642449f174051c73d20b247d561f87e106fc8168dc5d126b509000068968077c11b8410f6be1ebef97157c1e3a8c03fc6dab9e300a416f9a46da4ccd80017c385574f15579a363f"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x1d9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x240300, 0x0) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000480)) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$BTRFS_IOC_SPACE_INFO(r2, 0xc0109414, &(0x7f0000000940)=ANY=[@ANYBLOB="1e04000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffe8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff00"/25312]) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000100)=""/246, 0xf6}, {&(0x7f00000002c0)=""/175, 0xaf}], 0x2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000400)={0x35, 0x1, 0x2, 0x17, 0x1, 0xb72, 0x3, 0x11c, 0xffffffffffffffff}) r5 = openat$incfs(r3, &(0x7f0000000500)='.pending_reads\x00', 0x8ce00, 0x182) execveat(r5, &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0) 01:43:43 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x22200, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000008000002000000000000000000003800020000000000781e0e"], 0xaf2) close(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20d315) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x0, @empty}}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x600902, 0x100) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xd}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 01:43:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) bind$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid_for_children\x00') statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000980)=ANY=[@ANYBLOB="7472616e733d7463702c706f72863d3078303030303030303030303030346532302c756e616d653d7b2c76657273696f6e3d3970323030302c6f626a5f747970653d7b7b5e242c7569643e906bbd76efd5da0d988de98657ec4f3f2219a9d02d9ccec17f83c0bb7ab377c0e466263137fbe9dbc266c6cc1a690e74dc4e4b1b4f05e84a79c526012271fc3632178e3f83406254f48ae5dbc4dab7432f4f0638b5fcfb3d6aa8", @ANYRESDEC=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYBLOB="2c687973782c3065726d69745f646972656374696f2c61707072616973652c61707072616973652c6f0b5b4b568a6c47e3f4f156b258a15faf198ecd636ccd118ff2908eb6dec3d0066da8250403002adc7c85710a89a43ff6dc4ccde43d88ad566b74802839970900961c57c8ed3e930c72d9520e06e2305700000000000000000000000000000045d3b9639f4a6c42af4e8b5c42011dfe95cfd4c1b17e253f0459bad51c1c2896d2ff2f8c218e5fd4d48bb980968c7bcb0900e68362b38cb0b0513627319f50a6"]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x8a040, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@nodevmap}, {@fscache}, {@cache_mmap}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@uid_lt={'uid<', 0xee00}}]}}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="bb84d2ef12713dd503003e0000000000000000000000000040000000000000000000000200"/49], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = gettid() r3 = fork() clone3(&(0x7f00000002c0)={0x1000000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180), {0x13}, &(0x7f00000001c0)=""/14, 0xe, &(0x7f0000000200)=""/97, &(0x7f0000000280)=[r1, r2, r3], 0x3, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000006400000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x400000, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x5, 0xbf, 0x81, 0x9, 0x0, 0x5, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x39, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x22210, 0xcca, 0x4, 0xe32b29e55d861e34, 0x9, 0xbc, 0x1, 0x0, 0x5, 0x0, 0x7c}, r1, 0xd, r0, 0x3) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2321.641647] 9pnet: p9_fd_create_tcp (121539): problem connecting socket to 127.0.0.1 01:43:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf20a000000000000) 01:43:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x68ca, 0x3, &(0x7f0000000380)=[{&(0x7f00000001c0)="7b2e1844078e5d0cb6db15e8638f2bf29834030a3cb31f11c56e808e604a7e327bf5df81cd7ddecf49f85b82ac5e43a1ddfc195ae2bba49edaceecbe21a8a0365dc29a42e4dab77f50b55286fd6430fd326a000f29ee82d739034e3e555911064666311f1e51ec20ad9c386b3f2ceb2afd56be7528f96476aa17c8aa1f27e166daab72683d337816b04e1bc3b18f06bafb1197", 0x93, 0xc3}, {&(0x7f0000000280)="942cf738f2092af5ab0fb49701e7b5de9a3b83bd583f93b7edffc50b32ce0fcf028caf62bd66fc2acf062b35d26ba25c86632ea7339856b2f895ce1701606d5b4ac6e008dc670aa1d9feaf542060d3b81e658f52f2ff407d3762ab", 0x5b, 0x80}, {&(0x7f0000000300)="7986426310800d4e7ab43fbd2dd3094f699371493d060101712d6296d74c64dd30111b948bb7804e888f6f80490816b7eda309f57dcfe877e8ec60c85c1e9373ef119c5d407d2640c1e1e0a03e245d600f02d918fc088208e0df69f843109ba05d61c24bbbfc85dea47f56e532754cb41e0a4298eb2a0bdbe355", 0x7a, 0x40}], 0x800, &(0x7f0000000400)={[{@mode={'mode', 0x3d, 0x7}}, {}], [{@fowner_lt={'fowner<', 0xee00}}, {@permit_directio}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x37, 0x38, 0x62, 0x35, 0x37, 0x63, 0x31], 0x2d, [0x37, 0x62, 0x37, 0x33], 0x2d, [0x34, 0x33, 0x61, 0x39], 0x2d, [0x36, 0x30, 0x65, 0x65], 0x2d, [0x34, 0x65, 0x65, 0x65, 0x38, 0x39, 0x37, 0x36]}}}, {@obj_user={'obj_user', 0x3d, '^)[$]$&'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) mknodat$null(r1, &(0x7f00000004c0)='./file1\x00', 0x1000, 0x103) openat$zero(0xffffffffffffff9c, &(0x7f0000000500), 0x40000, 0x0) 01:43:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_io_uring_complete(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x18, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'syztnl0\x00', r3, 0x29, 0x3, 0xd, 0x1, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}, @loopback, 0x700, 0x40, 0x6, 0x1f}}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc1}, 0x2, 0x0, '\x00', @auto=[0x16, 0x34]}) sendfile(r1, r0, 0x0, 0x8) socket$inet6_udplite(0xa, 0x2, 0x88) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x402000, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r5, 0x7001) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r5, 0x7003) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) 01:43:43 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x40000015, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) fcntl$lock(r0, 0x26, &(0x7f00000000c0)={0x0, 0x3, 0x1, 0x2}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="6f450000000003003e0000251b1eb692d323422f8900000000000000003bb14da85c5b01ad1a55b34c733e5825350b86eba1fc9e01c13a26d61c6e30301ad4722cce9885eff83bc58addaac7c505f226a827d949be7fb9e1a7244d28254ef210ab46a42138e11d340d6a37ae8b5335f131148ebe559886866dab9a2a31a45c0a5baffd0d3a0c2c53bf91ffd2"], 0xaf2) close(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40300, 0x0, 0x0, 0x0, 0x0, 0xfffffac4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.freeze\x00', 0x0, 0x0) openat(r2, &(0x7f0000000140)='./file1\x00', 0x39d0acd349e0874c, 0x10) 01:43:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 01:43:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) kcmp(0x0, r1, 0xc7ea4638f4e28df7, r0, r0) 01:43:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000001c0)={0x3c, 0x1b, 0x9, 0x9, 0x1, 0x4e82, 0x3, 0x4f, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r1}, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x4, 0x8, 0x8, 0x0, 0x0, 0xffff, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x6}, 0x28, 0xfffffffffffffffe, 0x80000000, 0x5, 0x7, 0x6, 0x3, 0x0, 0x0, 0x0, 0x2}, r1, 0x4, r0, 0x3) 01:43:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000700000000000000590fe23eb118960003083e"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000006, 0x50, 0xffffffffffffffff, 0x42b90000) openat(r0, &(0x7f0000000140)='./file1\x00', 0x329a82, 0x4) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.max.depth\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20d315) fcntl$addseals(0xffffffffffffffff, 0x409, 0x3) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x1f, 0xff, 0x81, 0x6, 0x0, 0x401, 0x80, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0xffff, 0x4}, 0x8410, 0x1, 0x8000, 0x5, 0x1dc, 0x8, 0x3ff, 0x0, 0x8010001, 0x0, 0x3}, 0x0, 0xb, r3, 0x0) dup(r1) r5 = syz_open_dev$vcsu(&(0x7f0000000240), 0x155f, 0x80) ioctl$HIDIOCGRDESCSIZE(r5, 0x80044801, &(0x7f0000000280)) ioctl$BTRFS_IOC_SET_FEATURES(r2, 0x40309439, &(0x7f0000000100)={0x1, 0x0, 0x10}) llistxattr(&(0x7f0000000180)='.\x00', &(0x7f00000001c0)=""/91, 0x5b) 01:43:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600000007000000000000d8200eb9a7d9c560400000000000000000000002000000000000000000003800020000000000ff579162ed28b17ec3ce88e1f518295d8d23b43199431c612b1ea622c81fcbb1532184d8a4c6449b0ebe74c75e8f481074946fe84be21ee13a69fed70349caa5d885473902b2669756862fafae3d2a387efea846672d00"/148], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./file1/file0\x00', 0x100, 0x180) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x2b9}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="a0", @ANYRES16=0x0], 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x4001) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=@phonet={0x23, 0x7f, 0x0, 0x8}, 0x80, &(0x7f0000000240)}, 0x0, 0x4000000}, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000040)={0x0, 0x5fb3, 0x0, 0x0, 0x3de}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) 01:43:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0xc1055f80, 0x0, 0x0, 0x0, {0x39}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f453d46000000070000000000e6ffff02003e00000000000000000000000000400000000000000000000002000000000082e88d6f83d6d12e380100000074671ea432fc818a8078eec92d99f31402e68b71f75d311e72090f1e588729b29a0ee5b035a0b3c85a373fc541c0a8505b2d06e7e5f63b8015f6df869b38200da306c5a08b26131ff30ed6d8"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000001c0)={0x30, 0x0, 0x100, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r4) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01b4c82932e159069bc398722a53ea8f0000010000000000002100000009001f0070"], 0x28}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r6) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)={0x48, r7, 0x6a0, 0x0, 0x1, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_LLSEC_ENABLED={0x5}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0002}}]}, 0x48}, 0x1, 0x0, 0x0, 0x5c242ba4e38a84cc}, 0x100000a0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) 01:43:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000006000000003800020000000000000003bdc7a1cf4953216daa7044505e187c26e37eaf0cd8a4"], 0xaf2) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/softnet_stat\x00') execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r1, 0x80189439, &(0x7f00000000c0)) 01:43:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f00000000c0)={0x0, r3+10000000}}, 0xfffffffc) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r4, 0x7001) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0xc, 0x38, 0x16, 0x16, 0xa, 0x6, 0x1, 0xae, 0x1}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x20d315) rt_sigtimedwait(&(0x7f0000000100)={[0x4b97]}, &(0x7f0000000340), &(0x7f00000001c0)={0x0, 0x989680}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x9, 0x2010, r5, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r4, 0x9, 0x0, 0x4f9, 0x2, 0x1}, 0xcfad) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 01:43:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000540)='./file1\x00', 0x6, 0x5, &(0x7f00000006c0)=[{&(0x7f0000000580)="ba041f0427d916dc7e57cdb6c8481829b8b124a7bf1721e0ef1bfbcc86a0", 0x1e, 0xfff}, {&(0x7f00000005c0), 0x0, 0x3}, {&(0x7f0000000600)="a28f472bfc406a0fca2ccd61635b845a33aebb6aded75213679c7bea0442f3484128735c6325d891", 0x28, 0x2}, {&(0x7f0000000640)="41cba99e39ad0e2930c2c882b8f53c2286b2aef234e8f29deb55a390247cb99e8cc7e3f06f6502c31f3bc94c365e4322ddd2d1f3c378fb1c2b20d6096701405d25fe60502085105b18054e", 0x4b, 0xcab}, {&(0x7f0000001980)="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", 0x1000, 0x1}], 0x1000000, &(0x7f0000000740)={[], [{@obj_type={'obj_type', 0x3d, '!('}}]}) statx(r2, &(0x7f0000000780)='./file1\x00', 0x6000, 0x7ff, &(0x7f00000007c0)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x20d315) statx(r3, &(0x7f0000000180)='./file1\x00', 0x400, 0x4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d74630200000072863d3078303030303030303030303030346532302c756e616d653d7b2c76657273696f6e3d3970321b30302c6f606a5f747970653d7b7b5e242c7569643e906bbd76efd5da0d988de98657ec4f3f2219a977009ccec17f83c0bb7ab377c0e466263137fbe9dbc266c6cc1a690e74dc4e4b1b4f05e84a79c526012271fc3632178e3483406254f48ae5dbc4dab7432f4f0638b5fcfb3d6aa8", @ANYRESDEC=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r4, @ANYBLOB="2c687973782c3065726d69745f646972656374696f2c61707072616973652c61707072616973652c6f0b5b4b568a6c47e3f4f156b258a15faf198ecd636ccd118ff2908eb6dec3d0066da8250403002adc7c85710a89a43ff6dc4ccde43d88ad566b74802839970900961c57c8ed3e930c72d9520e06e2305700000000000000000000000000000045d3b9639f4a6c42af4e8b5c42011dfe95cfd4c1b17e253f0459bad51c1c2896d2ff2f8c218e5fd4d48bb980968c7bcb0900e68362b38cb0b0513627319f50a6"]) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000940)={0x1024, 0x6, 0x8, 0x401, 0x70bd2c, 0x25dfdbfc, {0x5, 0x0, 0x5}, [@typed={0x8, 0x40, 0x0, 0x0, @uid=r4}, @typed={0x8, 0x82, 0x0, 0x0, @uid=0xee01}, @generic="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"]}, 0x1024}, 0x1, 0x0, 0x0, 0x10000001}, 0x4000) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRES16=r0], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000100)=@v2={0x2, @aes256, 0x10, '\x00', @d}) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0xc6001, 0x0) [ 2335.810323] FAT-fs (loop5): Unrecognized mount option "obj_type=!(" or missing value 01:43:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r1, 0xffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x200080, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap}, {@debug={'debug', 0x3d, 0x2}}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x81}}, {@access_any}, {@aname={'aname', 0x3d, '--'}}], [{@measure}]}}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2335.871812] 9pnet: Could not find request transport: tc 01:43:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) fdatasync(r1) 01:43:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000b80)={0x53, 0x0, 0x25, 0x8, @buffer={0x0, 0x76, &(0x7f00000001c0)=""/118}, &(0x7f0000000ac0)="37e67afaac3b422b8aa2264dd144d00f354d04a0d874b2053ad5918bffdbd137c69bac77eb", &(0x7f0000000b00)=""/38, 0x6, 0x6, 0x2, &(0x7f0000000b40)}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x10001, &(0x7f0000000a00)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c76657273696f6ebd3970323030302e4c2c6e6f657874656e642c737562845f726f6c653d7d402c000eb64df5c3856ab7556af94e7e388c770bb3e644af03c51eec5c3a718c4f20c4de19000c543578ebd55c17c1191f2f26fd5f5acee40a0f93ebae3be1f2bf4b8c"]) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0xb94, 0x9, &(0x7f0000000800)=[{&(0x7f00000002c0)="ca551c75daa3f213c026b118f15b585fa14458c90923c85ee7cfc3ac958749f957ce26fb00d6455ff982d0393552fbb7c7e529a735cb7c09362d002ebcb8bae74a40bec1ea9b1347d40d8d30300c0d92dc5f90cc67a79991095fc79249d143ce5559202a3519ffbd89f8d0edc15bba33bad2f09856e1f2eda55a7d72ae6858383e5b420d91195f8025db849dd688e52f6b3fe02a6fcb85f7cec7a0f9dff949717cf52f83d6e27705c8e274193372707d39a434bafdc775d9bf03b569f96e787265197616df245677d743342bed06fcf2d5df4385b92e502ee1c4f7c66ce2b4c9a0cbbc3155bbb8ea66b6b2c36ff5514cbca56cfca93d", 0xf6, 0x3}, {&(0x7f00000003c0)="3914c805969ea1be4818815236bbf71e1a37be373d9616e3bcaf59963f34d63ba128d479895888ad8be3ade5e403d0271bcedb64582a44e8c0c169327bacead031a488db3eb2c2f8379669cd1593ececa785a8b038e404d2b0cce341ec0f2a0e2c9d899e2d2949295f696db5dabc5885b10c5128", 0x74, 0x85}, {&(0x7f0000000440)="2bed1c6c7b9fe997622b7eeae36bba05464d", 0x12, 0x800}, {&(0x7f0000000480)="9daa07c60feddb790a1cb7b3a8b5933d06917dbff47c8a663893b912967cfac54e7c5c69213e4fc9ba61fa41bb5d30beec161eb4673dc6b01b2c3f133463c9374dcfc7bc27a24da813e97ba2e2b7e739c4c249ad6dcb5f475fedf6e022f49837b1d4c29ba8b5fb764b983c4921c988946fcc8784f1cbd390f4437ce75ccd05485f4126a0fc627820edc1b79551ecb63b4f43718ba48d500c6ae446", 0x9b, 0x4e6b8320}, {&(0x7f0000000540)="da667dd0c99636d6305a7018587c4355608b9669203f15e735f431d046ed5a45f5d18e9d4ffeccaebea8c5c48d0af3040186668c3ecef6f6336cf2bd503d798752dfceab641f4ff9c997a8400781004c603f18244285123f98f7faf41999ba34030625d838d1b2d2e63eaee57e1453401ee7869cf91743741c3ad6979add8687c6", 0x81, 0x40}, {&(0x7f0000000600)="c40c0554390f00aa83ee1ccc3154b311b0d9bb", 0x13, 0x100000001}, {&(0x7f0000000640)="5642f4e297cdf4a341c578d68d4254bb820c26b2bfbb90114e67aa5890d169eb10a5cb7baeb79da410c1e96ee7c8d1e17ddcc65009498c8b3a5bc5420867a8955d73ad2a9ed71969d4274f7e1de09797d8d6a5e48b7d2535826bf933c03485112feaa6c3e65836390b54f0cfb7c98d6f02337f6d89ed2b5aeb66ca9a9f5e6eb6deb6a67e0cb2237da9516410084dd58d94e2917b581f5bcc3ec93f", 0x9b, 0x6}, {&(0x7f0000000700)="a3be50a0a2354149ae6eaeaa0fbc4a93e18a581273832eea1c91e4a0ff8038d537cf8e64c22f2da620aa8cce8971b5b7a5970b92266a247d4e4b84103a26408d9e7ba3444d759ade0d7769fb2fe6dcf4259321c23b187f272c6d2623d8b42f5cd29ef41c93c1c07f44de1d99477b97f9de928c9f9303901c3e82f345f6fc", 0x7e, 0x5}, {&(0x7f0000000780)="858dd8cee3ec49e400680b6a1af70b20bfe35f8ba4cfe1098d3eae9ab36628fdf4c8000be06f487addf827abfaf96693400b22cf63679982794fc0106aa6d52b9201e2b25920b615a806c8225898a9f4deef06cb3c68f413af388ac7ee3a10721c26bef6bfdd1b45cb84e4fe05bf32521fe0217251d1c0e22779", 0x7a, 0x94}], 0x900004, &(0x7f0000000900)={[{@nonumtail}, {@uni_xlate}], [{@fsmagic={'fsmagic', 0x3d, 0xffff}}, {@euid_eq}, {@smackfsdef={'smackfsdef', 0x3d, '{*x'}}, {@fsname={'fsname', 0x3d, '\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'version=9p2000.L'}}, {@smackfshat={'smackfshat', 0x3d, '9p\x00'}}, {@obj_type={'obj_type', 0x3d, 'noextend'}}]}) openat(r1, &(0x7f00000009c0)='./file1\x00', 0x10000, 0x2) 01:43:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$RTC_UIE_ON(r0, 0x7003) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 01:43:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e00000000000000000000000000400000000000000000000002000000000000000000003800020000000000000003"], 0xaf2) close(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) VM DIAGNOSIS: 01:49:05 Registers: info registers vcpu 0 RAX=ffffffff83e75230 RBX=0000000000000000 RCX=ffffffff83e5d02c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e75838 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85675808 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7523e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f6af4a4f010 CR3=0000000017fa2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000414100d800000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e75230 RBX=0000000000000001 RCX=ffffffff83e5d02c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e75838 RBP=ffffed1001130000 RSP=ffff88800898fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85675808 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7523e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005648ce1b1678 CR3=0000000017fa2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00eb02fe016c6c6f502e726567616e61 XMM02=0201039aff1500ea02fe016c6c6f502e XMM03=000006060201f5d5ef4afc230f4a06fc XMM04=02fe016c6c6f502e726567616e614d0c XMM05=069dfc46ce497ffc0601039aff2d00e9 XMM06=4a7edefc8fb35b04fcfcd5be9dfc5231 XMM07=00000606020406040601fb484104fc39 XMM08=20636578650a00657a696d696e696d20 XMM09=746e696820636578650a006873616d73 XMM10=7473657220726f747563657865110073 XMM11=007a7a75662063657865090073747261 XMM12=006574616469646e616320636578650e XMM13=78650a0065676169727420636578650b XMM14=7420636578650a007364656573206365 XMM15=00006e6567206365786508006c61746f