604347] ? security_file_permission+0x24e/0x570 [ 2160.605107] do_splice_direct+0x1c4/0x290 [ 2160.605724] ? splice_direct_to_actor+0x980/0x980 [ 2160.606434] ? selinux_file_permission+0x92/0x520 [ 2160.607152] ? security_file_permission+0x24e/0x570 [ 2160.607906] do_sendfile+0x553/0x1090 [ 2160.608484] ? do_pwritev+0x270/0x270 [ 2160.609066] ? wait_for_completion_io+0x270/0x270 [ 2160.609783] ? rcu_read_lock_any_held+0x75/0xa0 [ 2160.610467] ? vfs_write+0x354/0xa70 [ 2160.611029] __x64_sys_sendfile64+0x1d1/0x210 [ 2160.611705] ? __ia32_sys_sendfile+0x220/0x220 [ 2160.612391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2160.613165] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2160.613929] do_syscall_64+0x33/0x40 [ 2160.614496] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2160.615253] RIP: 0033:0x7f3e376bfb19 [ 2160.615810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2160.618498] RSP: 002b:00007f3e34c35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2160.619627] RAX: ffffffffffffffda RBX: 00007f3e377d2f60 RCX: 00007f3e376bfb19 [ 2160.620682] RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000000000007 [ 2160.621739] RBP: 00007f3e34c351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2160.622788] R10: 000000000020d315 R11: 0000000000000246 R12: 0000000000000002 [ 2160.623833] R13: 00007fffdeab2b1f R14: 00007f3e34c35300 R15: 0000000000022000 07:58:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0xffffffff00000000) 07:58:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0xa8002, 0x1ba) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000380)=[&(0x7f0000000180)='\x80', &(0x7f0000000280)='>\xdc\t\xa1\xd0\x1d\xc4\xb4\x82y\x01\xd2\x80\xb9>\x8ad\x196u\xcb\x89\x06\x00\x00\x00\x00\x00\x00\x00\xc0\x80\x18\xffP>K\xe6\x0e\xac\xc9Vt\xb8\xc5\xfa&D\xf1\x0eL\x8e~\x9b\x8e\x03\x00\x00\x00\x00\x00\x00\x00\x00o\xa1\a\xc9w\x88Cw\x16\xe5y\xff/\xd8F\x83\xedL\x92\xd3=$ \b\x00\x00\xc1\xca\xf8\xe7\x85\xdc\t\x7fv\xf1\xbf6\xc8y\xfb\x9fq\x9c`\xb1\xf0\xa6\xe9\xc1\xd86L<\x11\xb4\xdfJ\xd5;O\xff\x17\xa2:\x16 \xaf\x93HU \x94\x83\x84hVS@m_P\xfe\xb8.k\xc5Es_Q\x1c\xe4\xc6\x9d\xfdv\x80\xa7r\xf5]\x99\\\x9a\xa5\xd9\x808h\xe39\x88Z\xfbAt\xec\xe3\xdc:\xb3X\xb3U\xb0\x1f\x821R^K\x19\xd7\xb06\xb5\xc0\x02\xc6\xdc\x15\xb6\xbb\x90\xfe\xbe\xe4ZJ\\', &(0x7f00000000c0)='\x00', &(0x7f0000000100)='\x0e', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='}\\$\xc3\x00', &(0x7f0000000240)='\x00'], 0x100) 07:58:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x10000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:58:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) flock(r0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:58:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:58:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6800000000000000) 07:58:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x1c000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:58:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x8001) openat(r1, &(0x7f0000000100)='./file1\x00', 0x401, 0x26) syz_io_uring_setup(0x7037, &(0x7f0000000140)={0x0, 0x2000ddd0, 0x10, 0x2, 0x3d9}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$vcs(0xffffffffffffff9c, &(0x7f0000000300), 0x20600, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) flock(r4, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e}, 0x0) r7 = syz_io_uring_setup(0x7, &(0x7f0000000080)={0x0, 0x80000, 0x4}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x5, 0x300e, @fd=r7}, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f00000002c0)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000280), r4, 0x3, 0x0, 0x1}, 0x3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="0000002b123e0dc648d5062d8753277577275259357d8ff381fa849b2203f63bfde58ce74aa85af9d8e9b370df35e9870a876818fbaf7c013044c6581743ad096b6399d481066dab735a84b1166896c5d3f5f709c8957acaec12d44e2fa0a2660336e003df9cc77cabe4b032ae08dbc6c8e5a690221818a271f3563d6dc1219de006740fb852b7693d36e6df7722d2394395df8e3681938f4f19ae306ee90a90b2de9d409fbc30fba013ca8c4dc75bfca2adcd7bebd4eea8b8e0daf1209d265f44104652505997c51e5dfee3b861dc9dbeed436aacd4965b3df93629d2b14f6528365dc7f181572d88357b0ab00cb87029f2ed888b802baf808ac809c8af41cfcbb59da2af4e5dc8b4a540d0aea3adf1aadf3301de4ea6f4c53b182c163a3e2c7f385736077a4ddbc3e6df0d9832c1", @ANYRES16=r6, @ANYBLOB="0c39dbc5cafa7a90a3270805286b88e29f7e2a627b4062b713107fdb5225dd700694c72e9bf5fa6f2a629c0259fa8624173f7e0b3b51ce18b3510b195bfe78c47fcda0bb096b024605da556552a4b01ead7b7cf2b94e1754f64281a90db70e96d106281cf7e2170cbd743053f6c107e60de301b38f72a2f3de37425c66cf2acf217ab2c4fdc24c607e"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xd0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r4, 0x0, 0x0, 0x0, {0x1}, 0xaca8b1330354523d, {0x0, r5}}, 0x9) syz_io_uring_submit(r2, 0x0, &(0x7f0000000240)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r3, 0x6, 0x0, 0x8, 0x3, 0x1, {0x0, r5}}, 0x5) 07:59:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x3e000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x7, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000003d80)={{0x1, 0x1, 0x18, r0, @in_args={0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000003dc0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600)=[{{&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000240)="faeb26f05d33b7baeeb1d38b2dfb3a0b65133534168650b3d5588e98cf7fcf4033943981c2001fdc8cb2e8577fc2468e38d9dab0ab4c058e685ef44d9df164899534c246fdeb74183b62a036fae819dafd38f5a97fa932321cae80ca1db84b3c4c5a97f1daf3705129ca64ca45bd62cb15f8c754dccc134fdc0115e129e91c91bde4f35b33e9eff4b7c04cf6954ca84d50601afb4ee08256032ebb64cc3bbf8b757249acf4", 0xa5}], 0x1, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38, 0x840}}, {{&(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000002900)=[{&(0x7f0000000440)="66bf9bce3f31cafc0f74ace291854bec529489305ee7aaa760e711101546f9ef625b195d690636f1f6284423fee9761d48de86fe666cd6b701562d6dc4129556a4d709d68bf667f8af22707ecf2c4cc05f5328c6e8aaa3e749949b421d0c5de2c6f3c3df633675644f843fe07f4db23bbd91a85d90fe271723a8ce189a3628a2133a4ed1e7cb1721487ff03ecb1e", 0x8e}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="a95e4306a5b3b9289083df7d58d923c97ee8e7fc753daa0db9a84ed946dc38840858d02b3dd284afe9634194306013510ee2b9d822c01262e97d4f2139b199c59551831de8510455a0178adc0f5b1d3ecdacdc17a9d88860bdbec6ee50c4c127a81683ce63752b74dfa7b911f49a10d94b13d30d39d25868c73536dca9806d16c6980213b61f28510bbcad61eda15efc4e38d36c2c763c65ae65afb14492a45159eb1f12921c17d2a58dd65668f557abfb457c19b7c1382eb7fd0b5fda5ba11326bdbf675211224a4c03291e14f278a81ebc2af92a041ff46950e94d5f27fb5deb31769f18e486c023", 0xe9}, {&(0x7f0000001600)="94a281de5efdeb356cafca4f16a1fcebc72f8e2a4b4b3a89146b97a14c554212808bbe58da8fa86d7b9cdd0aec721239221697dc507b0e165d147e9865bd4aadd5c5fc78cbef6d0c7a6d7487d5a01f2df76f749c76be91c0ad96b320a448178f442717cf77f5804fb2b6cf6ca27cf3faf75181cc94d619bdf45f2bb9567100ef19a3e256c20fb9b9ee420a8a22d37c581d6884598ed52f93a60a83198eb7bc9895e73b5844c1d93128d2505353d6fad07261bcf7e647ddcad6547e36f9553e57168a279f7de4eb2173bb0468ea69719f1107fd20034f25aae87f1b6f0472b1a5", 0xe0}, {&(0x7f0000001700)="f6f5d96449421700d1dc5438ca6ee18f5e940ea47ada5ee293d693ea51aabb97326730a6c3b6857e3cd76d4291717e338e8c5190e5ad8e07f0b158bffa084d74def7fc9796aba6826ab265dee41bd48eef512a5c338136d10c0927cf601f75f22aac8c46aaafb937eedd4bb76d39a1e18655a87ea096b7533d38a69e32fed96abcc7307264c0583f9251b1d4f1025e10c12dbbfb26036bde5fef82f94bd31a1a00b57cd38efb9f6ce561a44b47cb", 0xae}, {&(0x7f00000017c0)="af923bf68b72f2f4ed6468acb830ba933b47ad5254b96c6d97ded8f54a2eadd1a9c7dfc1822d27f06bddb3092b8f9f8aa4c25e87a35fb43cf5bf438f1cd7b2d0b601b34e969e30e410a47b663a22e14933d65c5e7c40e8e3a43a4f5a26e4ac748ff8ec1a686a680b8d8ab6256bccdedd97687bd1f016c490f986442ee44f0df01e874339dfce5723caadc4aa87c82a2ed4096b47a6e6bdbfeebcb89955a9609a9cb764eaa7cdf1cf6edb83f3d6937cadab7c238637a02a3b5cf2742e881bd2de5b232c5e8f357a5af9822b4b0fba7f3f8440deea4f60076ade359166628d03b50802b987d058f98ce893c3", 0xeb}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000028c0)="29f3a31e93c13f229024f398b8e16f61096dd3536bf3bc929447de985457e649edaf2d", 0x23}], 0x8, 0x0, 0x0, 0x800}}, {{&(0x7f0000002980)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000003c40)=[{&(0x7f0000002a00)="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", 0x1000}, {&(0x7f0000003a00)="4388961a0904be3917a2ff84f3c51f7d3a", 0x11}, {&(0x7f0000003a40)="0936d80ed3e018d6be4f38521c086fd38550dc9e0d1bbd58b982749afb74dba5ae67c9f339716852043d11c56916d59ab432", 0x32}, {&(0x7f0000003a80)="3dfd387247147efbe186eb1d9438277da99adbca804f06b5a1235d7a0290715210ed9cd6f9da4545539d4df7444c4a92637b68f08b5d9a7b10b0be51be662126c6227e1f52f8b42a8929a97a91f428df7d58e50e17f965c08d6d6bb3919f5b46c07b12bc0eb655dcfec6d1fbad64d751bb6e88adf0e52a0d13f24ecc1135de32318d1b1867619d4a43ca126471355af25f4f89b8a059", 0x96}, {&(0x7f0000003b40)="17b085a4dd47b156abb4ceae0a1002111d6533999ec4698864ac10418aedbc801064c05df2c2d81051", 0x29}, {&(0x7f0000003b80)="e15db4d8d0da87e00e1e2d5836be8e8e3e23ad904288442469ab290e2987337a5ff64f09b809fe6d0dd2937eebabb33bb70c43472b1031430e92108a0ea85be9662ed26ca9de3c4cf36f666272311e20c101e1f176e5d8ad4638d3dcbfc44f7876067de1b6d0d4e56424e5f67f0cda340026562fbd7d7e04b705b8de0f97cec5a404b8cb3e9436b79213a568ffe0ed11577230b7cf331fb4bbcba7a985cfd88727a01365a7", 0xa5}], 0x6, &(0x7f0000003e00)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r0, r1, r2, r0, r3]}}], 0x50, 0x4000080}}, {{&(0x7f0000003e80)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000052c0)=[{&(0x7f0000003f00)="2e358ced13b83585f7aeaa3c8bf0b025d774207363cc674cfe2ed81bf3991f56cf2e4e66c25af7be4392dab186a56dddf6a20bf4a451bc074317db856d2faf9d40d130272a0513cabd7de5f4ce3af3cf37350f54b4064b782b0fa7e74c35ac3c0885e2cf3420306cd96280e9d505cc11bab50a73a6340603ed335877ff65a2029704fd880b3a1f3f4e21a7c1b188e95402bc52b15974ff1aaa70f0066a29a91a34b82c5a99fcb37f5d13d4ad70d7a8a3793b12b212d882f93fc9eccdaa4676a3ae77", 0xc2}, {&(0x7f0000004000)="69d87638f17a778d52fc9f5a90105a06a8853a51ecc182ace276bc939ebd4fbde18108277b20fd4d7f8432c1426b55", 0x2f}, {&(0x7f0000004040)="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", 0x1000}, {&(0x7f0000005040)="6d48a0ae65821b3615a76262aeecc791b2bb13d316f998ff6b0015d468bb15576cc90ac136134883298901673dcfccce854753bc6e278a28f700b90a2055c140d89635aa1abed5668a97d973630f217b51055a7ce8ba8cb861f34113c34d576bed48d0b7311bd2edb36f8e420515657d1bfe7d39245e3e06253dfa68c6d1efd6c9977f76f59c0ea97f2ed2911b1f2a7e40a1c21b8d8714672ec5c66778ba77dd1c172c3e62ea0416809775f3235b2ff962838a8cd8b55795184e85d36d3ff48fa626f9", 0xc3}, {&(0x7f0000005140)="666ea34651094ab44a2dcb080e26beb0f41a90e8382e2a1b4d1371c5296f09319a23331ed43c0523d1aea4e26d7765ff8d751b2c819d3c6b01ba97dcff53c5cf78c9feb7ffe5186fa80dfe7b66ce5a19193205b0eb5b4f1200c4bfbd4727cb0481dbe49bf80dec3b29b117f9ea47fd0c971e5093b39a959fd5e45d76c378d55ac056c80086d16ce4d578ab3c814c49e48e8fc0e9e8d4f86ce8700dcfa3daec58965d435538c67224d7c81092a6039c0e7af3c9ecaf4947037cb7beb829c8a09577ca06c29fae19d72e27eeea825031b4ac49a848185b", 0xd6}, {&(0x7f0000005240)="19a57b573d19c1c81debb8d03b4e419e143f91eebbfd0b620cbca4a239e01b1cc7305a64bfb692da13e53ba6237710e6140ad1218a6508eb4b176b1d732aea7062fe8ad6d99bdd9449e46b8822acdd0b6633df76d7e5ee33ed1122ddd2daed41f8", 0x61}], 0x6}}, {{&(0x7f0000005340)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000053c0), 0x0, 0x0, 0x0, 0x40}}, {{&(0x7f0000005400)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000005580)=[{&(0x7f0000005480)="6657282e41f4bc245ed7a0c1f08e7e89c85a03594893ef756ba1770a8c1fc09df785e0516ff74c2ef847ae41e13b150398a743c14ceae7ce651ba437224b97c1c0fd9a2c20a2b9d48557025e5929a181887b43921a53dd17e592a37dcb54ec1813d201fe117597ef2abe6fcbc0ccbf03db1706bd23959d0e071a37e181bb7b6b156ab21f00f73ff8a57929102dcb9488a6ad8c5d10491fd6cff8157c4ae7a84e469937c5ad94881df499ff50e0a46cf567e7afac8948172674b26b79eafc39935469b004c1a56361b044c30eabd300dc24ba277d601dd9c2e904b4858716002e0ae6a37b7499e3869e7a36548df3010d982caa40d4", 0xf5}], 0x1, &(0x7f00000055c0), 0x0, 0x20008000}}], 0x6, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x20000000}) fsetxattr$security_capability(r4, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[], 0xfdef) openat(r4, &(0x7f0000000140)='./file0\x00', 0x80, 0x80) acct(&(0x7f00000000c0)='./file0\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x56900, 0x0) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) 07:59:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4800) 07:59:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) accept4(r1, &(0x7f0000000340)=@isdn, &(0x7f00000003c0)=0x80, 0x0) clone3(&(0x7f0000000000)={0x1048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:09 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) (fail_nth: 13) 07:59:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6c00000000000000) 07:59:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2175.440203] FAULT_INJECTION: forcing a failure. [ 2175.440203] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2175.442258] CPU: 0 PID: 34458 Comm: syz-executor.3 Not tainted 5.10.215 #1 [ 2175.443282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2175.444515] Call Trace: [ 2175.444927] dump_stack+0x107/0x167 [ 2175.445475] should_fail.cold+0x5/0xa [ 2175.446060] __alloc_pages_nodemask+0x182/0x600 [ 2175.446745] ? xa_load+0x12d/0x2c0 [ 2175.447284] ? lock_downgrade+0x6d0/0x6d0 [ 2175.447899] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2175.448813] alloc_pages_current+0x187/0x280 [ 2175.449476] __page_cache_alloc+0x2d2/0x360 [ 2175.450131] page_cache_ra_unbounded+0x207/0x6f0 [ 2175.450843] ? read_pages+0xbc0/0xbc0 [ 2175.451414] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2175.452117] ondemand_readahead+0x8e5/0x1150 [ 2175.452794] page_cache_sync_ra+0x138/0x170 [ 2175.453455] generic_file_buffered_read+0xc8e/0x2920 [ 2175.454242] ? pagecache_get_page+0xc80/0xc80 [ 2175.454908] ? lock_chain_count+0x20/0x20 [ 2175.455538] ? mark_lock+0xf5/0x2df0 [ 2175.456103] ? mark_lock+0xf5/0x2df0 [ 2175.456670] generic_file_read_iter+0x33f/0x490 [ 2175.457378] ? lock_chain_count+0x20/0x20 [ 2175.458008] ext4_file_read_iter+0x184/0x4c0 [ 2175.458674] generic_file_splice_read+0x455/0x6d0 [ 2175.459396] ? pipe_to_user+0x170/0x170 [ 2175.459986] ? _cond_resched+0x12/0x80 [ 2175.460570] ? avc_policy_seqno+0x9/0x70 [ 2175.461184] ? selinux_file_permission+0x92/0x520 [ 2175.461918] ? pipe_to_user+0x170/0x170 [ 2175.462518] do_splice_to+0x10e/0x160 [ 2175.463094] splice_direct_to_actor+0x2fe/0x980 [ 2175.463792] ? pipe_to_sendpage+0x380/0x380 [ 2175.464442] ? do_splice_to+0x160/0x160 [ 2175.465054] ? security_file_permission+0x24e/0x570 [ 2175.465809] do_splice_direct+0x1c4/0x290 [ 2175.466432] ? splice_direct_to_actor+0x980/0x980 [ 2175.467145] ? selinux_file_permission+0x92/0x520 [ 2175.467870] ? security_file_permission+0x24e/0x570 [ 2175.468628] do_sendfile+0x553/0x1090 [ 2175.469226] ? do_pwritev+0x270/0x270 [ 2175.469802] ? wait_for_completion_io+0x270/0x270 [ 2175.470527] ? rcu_read_lock_any_held+0x75/0xa0 [ 2175.471213] ? vfs_write+0x354/0xa70 [ 2175.471772] __x64_sys_sendfile64+0x1d1/0x210 [ 2175.472446] ? __ia32_sys_sendfile+0x220/0x220 [ 2175.473135] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2175.473916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2175.474681] do_syscall_64+0x33/0x40 [ 2175.475239] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2175.475995] RIP: 0033:0x7f3e376bfb19 [ 2175.476554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2175.479237] RSP: 002b:00007f3e34c35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2175.480352] RAX: ffffffffffffffda RBX: 00007f3e377d2f60 RCX: 00007f3e376bfb19 [ 2175.481413] RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000000000007 [ 2175.482461] RBP: 00007f3e34c351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2175.483510] R10: 000000000020d315 R11: 0000000000000246 R12: 0000000000000002 [ 2175.484561] R13: 00007fffdeab2b1f R14: 00007f3e34c35300 R15: 0000000000022000 07:59:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x7f000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x2, 0x1, 0x4084b7c, 0x0, 0x3, 0xfffffffe, 0x119, 0x38, 0x12a, 0x3b, 0x1, 0x20, 0x1, 0x0, 0x58, 0x3f}, [{0x60000006, 0x4, 0x5, 0x7, 0xaffa, 0x3, 0x81, 0x7}, {0x6474e551, 0x3f, 0x6, 0xd4, 0x7, 0xfff, 0x2, 0x9}], "e33fe85ff0c3893746f49767c8fd6b0193d1fab4259a89e7f58f2784d9781c813083b8358034ed", ['\x00', '\x00']}, 0x29f) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) r4 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x1, 0x0, 0x22, 0x7, 0x0, 0x1ff, 0x2004, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x8, @perf_config_ext={0x2, 0x80}, 0x4002, 0x1, 0x2, 0xe, 0xaf, 0x1, 0x1, 0x0, 0x8, 0x0, 0x81}, r0, 0xc, r0, 0x3) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x84800) r7 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r7, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000240)={0xfffff801, 0x0, &(0x7f0000000200)=[r3, r0, r4, r1, 0xffffffffffffffff, r5, r6, r1, r7]}, 0x9) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7400000000000000) 07:59:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xe8030000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4c00) 07:59:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001a440), 0x0) 07:59:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000000c0)) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x7fffffff}}, './file1\x00'}) sendmsg$NFT_MSG_GETOBJ_RESET(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x78, 0x15, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x8}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x400c051) pread64(r1, &(0x7f0000000140)=""/240, 0xf0, 0xa516) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4201, 0x2) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2175.773789] Process accounting resumed 07:59:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xf4010000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) r1 = request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r0) keyctl$set_timeout(0xf, r0, 0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f00000000c0)=""/210, 0xd2) read(r2, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7a00000000000000) 07:59:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001a440), 0x0) 07:59:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r1 = openat$cgroup_devices(r0, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r1, 0x80047213, &(0x7f0000000140)) r2 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) copy_file_range(r2, &(0x7f0000000180)=0x2f, r3, 0x0, 0x80000000, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xfdffffff}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001a440), 0x0) 07:59:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x46e2, 0xa) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) read(r1, &(0x7f0000019340)=""/102384, 0x18ff0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fcntl$dupfd(r0, 0x0, r0) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6800) 07:59:23 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) (fail_nth: 14) 07:59:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x100000001, 0x6, &(0x7f00000004c0)=[{&(0x7f00000001c0)="242c26b275521e27eb75d091b8ae05f7af410f8534652f0d63f03ec6fd5c0501964628bb1c8e1b4c6e59ef67ebfe3ac9f14ce1db59eb59a385113fc9918eeb4ae6d6fd43c4", 0x45, 0x31c7e95e}, {&(0x7f0000000240)="b4fc7f87df9aaa9cb97564089e99f5a18aa06ed77a3954ae88565703353bf40c796558149669aa5abcbaf14f8ec279b70aa6c8a9c101bf100f9d70c5d0abde9aa03a181684cbe5130d6e507fc1784e4e3439760b11ac4f554ff2ca075596b78321255e8fb49e80946820cc0fba41ab4feb5f19993eb7f962169ab5765523bce921d9f8a362343b907d0596eee4b9c79b90bab4e3e55079153cf3b754a8bfddd0bb248ce356f98594838dbb2a33d8fd62918dbdfe1665c92c95", 0xb9, 0x3}, {&(0x7f0000000300)="a75f20a9c6e76a923ed32cc61a33d1d258f1a472223a1ce37072905ac41154baf3e1017999a862557c1b7359b2ab12bb929ccdf018a2e4178eb6121dfb3ba228453baf9bb6bddb87053afe7e78d1415aab548ed18bcd386bb17176230d111ddbbe56146d822df70723010ff43ce9468873b541c5a4b1f2b925d786273d9c4e06db47d6f2830b12f27d2f92f60bf99c74dea06827a979cfb413d566b02a5682e95307a64cdc5ec0a164b79f818726a4ffa47b0fa6ba07d5dfa649d475cb0153f06968b627e63387e908cf77d9ef31c58937d853696b83cd4283e589e1647b42716addaeac234631861ae7e0962880242da898", 0xf2, 0x40}, {&(0x7f0000000400)="b22003940a97b9361483c4d233fc22e30593c57225344c3e073ec4f9e126865438312fa5d9a3d94a94149770449967cb58f1ef5e0d04777f941b32302f3bbc56", 0x40, 0x1}, {&(0x7f0000000440)="2b662ccff3aa4696cd1b0bd580c6556bee25eed4e5c6fcd6cbb72d7ec9f09bbbd9c336bada9b", 0x26, 0xf7}, {&(0x7f0000000480)="e61230fb9e7a66601268faf377b237d554909bb1fd5477cb64a017b629e634dcd9", 0x21, 0xb35}], 0x60000, &(0x7f0000000580)={[{'/dev/sr0\x00'}, {'/dev/sr0\x00'}, {'/dev/sr0\x00'}], [{@seclabel}, {@subj_type={'subj_type', 0x3d, 'security.capability\x00'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@dont_appraise}, {@fowner_eq}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@obj_type={'obj_type', 0x3d, 'security.capability\x00'}}]}) openat(r1, &(0x7f0000000640)='./file0\x00', 0x80200, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:23 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xfeffffff}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0xffffff7f00000000) 07:59:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x202, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000100)={0x57, 0x1000, 0x6, {0x6, 0x7}, {0x7f, 0x8}, @cond=[{0x200, 0x401, 0x1, 0x0, 0x8, 0x81}, {0x2, 0x7, 0x8, 0x8, 0x4, 0x200}]}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000000c0)) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f00000001c0)=[&(0x7f0000000140)='+,-(.[\x00', &(0x7f0000000180)=')\x00'], 0x0) 07:59:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, 0x0, 0x0) [ 2189.911450] FAULT_INJECTION: forcing a failure. [ 2189.911450] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2189.913649] CPU: 1 PID: 35824 Comm: syz-executor.3 Not tainted 5.10.215 #1 [ 2189.914707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2189.915971] Call Trace: [ 2189.916396] dump_stack+0x107/0x167 [ 2189.916967] should_fail.cold+0x5/0xa [ 2189.917565] __alloc_pages_nodemask+0x182/0x600 [ 2189.918279] ? xa_load+0x12d/0x2c0 [ 2189.918846] ? lock_downgrade+0x6d0/0x6d0 [ 2189.919496] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2189.920436] alloc_pages_current+0x187/0x280 [ 2189.921123] __page_cache_alloc+0x2d2/0x360 [ 2189.921795] page_cache_ra_unbounded+0x207/0x6f0 [ 2189.922516] ? read_pages+0xbc0/0xbc0 [ 2189.923080] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2189.923793] ondemand_readahead+0x8e5/0x1150 [ 2189.924463] page_cache_sync_ra+0x138/0x170 [ 2189.925121] generic_file_buffered_read+0xc8e/0x2920 [ 2189.925905] ? pagecache_get_page+0xc80/0xc80 [ 2189.926575] ? lock_chain_count+0x20/0x20 [ 2189.927202] ? mark_lock+0xf5/0x2df0 [ 2189.927763] ? mark_lock+0xf5/0x2df0 [ 2189.928323] generic_file_read_iter+0x33f/0x490 [ 2189.929025] ? lock_chain_count+0x20/0x20 [ 2189.929643] ext4_file_read_iter+0x184/0x4c0 [ 2189.930304] generic_file_splice_read+0x455/0x6d0 [ 2189.931013] ? pipe_to_user+0x170/0x170 [ 2189.931594] ? _cond_resched+0x12/0x80 [ 2189.932183] ? avc_policy_seqno+0x9/0x70 [ 2189.932776] ? selinux_file_permission+0x92/0x520 [ 2189.933516] ? pipe_to_user+0x170/0x170 [ 2189.934113] do_splice_to+0x10e/0x160 [ 2189.934685] splice_direct_to_actor+0x2fe/0x980 [ 2189.935388] ? pipe_to_sendpage+0x380/0x380 [ 2189.936028] ? do_splice_to+0x160/0x160 [ 2189.936634] ? security_file_permission+0x24e/0x570 [ 2189.937393] do_splice_direct+0x1c4/0x290 [ 2189.938011] ? splice_direct_to_actor+0x980/0x980 [ 2189.938716] ? selinux_file_permission+0x92/0x520 [ 2189.939440] ? security_file_permission+0x24e/0x570 [ 2189.940190] do_sendfile+0x553/0x1090 [ 2189.940766] ? do_pwritev+0x270/0x270 [ 2189.941339] ? wait_for_completion_io+0x270/0x270 [ 2189.942053] ? rcu_read_lock_any_held+0x75/0xa0 [ 2189.942735] ? vfs_write+0x354/0xa70 [ 2189.943292] __x64_sys_sendfile64+0x1d1/0x210 [ 2189.943954] ? __ia32_sys_sendfile+0x220/0x220 [ 2189.944629] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2189.945403] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2189.946162] do_syscall_64+0x33/0x40 [ 2189.946708] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2189.947459] RIP: 0033:0x7f3e376bfb19 [ 2189.948005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:59:23 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xffffff7f}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2189.950664] RSP: 002b:00007f3e34c35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2189.951983] RAX: ffffffffffffffda RBX: 00007f3e377d2f60 RCX: 00007f3e376bfb19 [ 2189.953025] RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000000000007 [ 2189.954060] RBP: 00007f3e34c351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2189.955094] R10: 000000000020d315 R11: 0000000000000246 R12: 0000000000000002 [ 2189.956148] R13: 00007fffdeab2b1f R14: 00007f3e34c35300 R15: 0000000000022000 07:59:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, 0x0, 0x0) 07:59:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(0xffffffffffffffff, 0x80489439, &(0x7f00000000c0)) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, 0x0, 0x0) 07:59:37 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) (fail_nth: 15) 07:59:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xfffffffd}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) fstatfs(r0, &(0x7f0000000100)=""/93) clone3(&(0x7f0000000280)={0x1040100, 0x0, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0xf) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) fsetxattr$security_evm(r2, &(0x7f00000001c0), &(0x7f00000003c0)=ANY=[@ANYBLOB="05001100000009003b4df93b18b7a9bd9e3c9dbe26e225295e63e3e65651cde8d9d713d13f553e2436a2d5c08007c4852da2582565223ef4e27e071699f1689762d444d495c7194c86e012902260f84a6e158ca7d3"], 0x44, 0x2) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5}) fsetxattr$security_capability(r1, &(0x7f0000000340), &(0x7f0000000380)=@v2={0x2000000, [{0x7ff, 0x4}, {0xfffffffd, 0xffff0001}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r1, &(0x7f0000000a40)={r1, 0xffffffffffffffff, 0x7}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x6, 0x101, 0x5}) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x2a840, 0x0) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x400) close_range(r1, r1, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000140)) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x80225a20) 07:59:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, &(0x7f0000000100)={0x5, 0x1}) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_open_dev$ptys(0xc, 0x3, 0x1) fcntl$getown(r2, 0x9) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x8c440, 0x1aa) 07:59:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0xffffffff00000000) 07:59:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6c00) 07:59:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x2, 0x1, 0x4084b7c, 0x0, 0x3, 0xfffffffe, 0x119, 0x38, 0x12a, 0x3b, 0x1, 0x20, 0x1, 0x0, 0x58, 0x3f}, [{0x60000006, 0x4, 0x5, 0x7, 0xaffa, 0x3, 0x81, 0x7}, {0x6474e551, 0x3f, 0x6, 0xd4, 0x7, 0xfff, 0x2, 0x9}], "e33fe85ff0c3893746f49767c8fd6b0193d1fab4259a89e7f58f2784d9781c813083b8358034ed", ['\x00', '\x00']}, 0x29f) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) r4 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x1, 0x0, 0x22, 0x7, 0x0, 0x1ff, 0x2004, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x8, @perf_config_ext={0x2, 0x80}, 0x4002, 0x1, 0x2, 0xe, 0xaf, 0x1, 0x1, 0x0, 0x8, 0x0, 0x81}, r0, 0xc, r0, 0x3) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x84800) r7 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r7, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000240)={0xfffff801, 0x0, &(0x7f0000000200)=[r3, r0, r4, r1, 0xffffffffffffffff, r5, r6, r1, r7]}, 0x9) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2204.140868] FAULT_INJECTION: forcing a failure. [ 2204.140868] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2204.143230] CPU: 0 PID: 36467 Comm: syz-executor.3 Not tainted 5.10.215 #1 [ 2204.144379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2204.145756] Call Trace: [ 2204.146206] dump_stack+0x107/0x167 [ 2204.146818] should_fail.cold+0x5/0xa [ 2204.147461] __alloc_pages_nodemask+0x182/0x600 [ 2204.148234] ? xa_load+0x12d/0x2c0 [ 2204.148832] ? lock_downgrade+0x6d0/0x6d0 [ 2204.149530] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2204.150542] alloc_pages_current+0x187/0x280 [ 2204.151273] __page_cache_alloc+0x2d2/0x360 [ 2204.151998] page_cache_ra_unbounded+0x207/0x6f0 [ 2204.152795] ? read_pages+0xbc0/0xbc0 [ 2204.153412] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2204.154193] ondemand_readahead+0x8e5/0x1150 [ 2204.154924] page_cache_sync_ra+0x138/0x170 [ 2204.155641] generic_file_buffered_read+0xc8e/0x2920 [ 2204.156502] ? pagecache_get_page+0xc80/0xc80 [ 2204.157245] ? lock_chain_count+0x20/0x20 [ 2204.157932] ? mark_lock+0xf5/0x2df0 [ 2204.158553] ? mark_lock+0xf5/0x2df0 [ 2204.159174] generic_file_read_iter+0x33f/0x490 [ 2204.159936] ? lock_chain_count+0x20/0x20 [ 2204.160626] ext4_file_read_iter+0x184/0x4c0 [ 2204.161368] generic_file_splice_read+0x455/0x6d0 [ 2204.162168] ? pipe_to_user+0x170/0x170 [ 2204.162825] ? _cond_resched+0x12/0x80 [ 2204.163473] ? avc_policy_seqno+0x9/0x70 [ 2204.164144] ? selinux_file_permission+0x92/0x520 [ 2204.164954] ? pipe_to_user+0x170/0x170 [ 2204.165628] do_splice_to+0x10e/0x160 [ 2204.166260] splice_direct_to_actor+0x2fe/0x980 [ 2204.167036] ? pipe_to_sendpage+0x380/0x380 [ 2204.167757] ? do_splice_to+0x160/0x160 [ 2204.168417] ? security_file_permission+0x24e/0x570 [ 2204.169274] do_splice_direct+0x1c4/0x290 [ 2204.169958] ? splice_direct_to_actor+0x980/0x980 [ 2204.170746] ? selinux_file_permission+0x92/0x520 [ 2204.171540] ? security_file_permission+0x24e/0x570 [ 2204.172373] do_sendfile+0x553/0x1090 [ 2204.172999] ? do_pwritev+0x270/0x270 [ 2204.173631] ? wait_for_completion_io+0x270/0x270 [ 2204.174422] ? rcu_read_lock_any_held+0x75/0xa0 [ 2204.175176] ? vfs_write+0x354/0xa70 [ 2204.175792] __x64_sys_sendfile64+0x1d1/0x210 [ 2204.176526] ? __ia32_sys_sendfile+0x220/0x220 [ 2204.177287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2204.178132] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2204.178972] do_syscall_64+0x33/0x40 [ 2204.179578] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2204.180410] RIP: 0033:0x7f3e376bfb19 [ 2204.181021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2204.183984] RSP: 002b:00007f3e34c35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2204.185233] RAX: ffffffffffffffda RBX: 00007f3e377d2f60 RCX: 00007f3e376bfb19 [ 2204.186392] RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000000000007 [ 2204.187556] RBP: 00007f3e34c351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2204.188718] R10: 000000000020d315 R11: 0000000000000246 R12: 0000000000000002 [ 2204.189886] R13: 00007fffdeab2b1f R14: 00007f3e34c35300 R15: 0000000000022000 07:59:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xfffffffe}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_NOP={0x0, 0x4}, 0x8c) pread64(r0, &(0x7f0000000100)=""/57, 0x39, 0x9) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7400) 07:59:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x200000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x1, 0xffffffffffffffff}) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x80, 0xff, 0x2, 0x81, 0x8, 0x0, 0x1000, 0xfedfaebb4c94488a, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20, 0x2, @perf_config_ext={0xd90, 0x7d}, 0x1014, 0x3ff, 0x8, 0x6, 0xffffffffffff8001, 0x400, 0xe1, 0x0, 0x9, 0x0, 0x7}, r0, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xff, 0x0, 0xab, 0x0, 0x5b, 0x13c2157a5349d75f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffff0000}, 0x2a3a48abc95dc611, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x7, 0x7, 0x6, 0x4, 0x0, 0x0, 0x5042, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x0, 0x8000}, 0x44, 0x7f, 0x8a, 0x1, 0x401, 0x1000, 0x40, 0x0, 0x1f, 0x0, 0x8dd1}, r2, 0x3, r0, 0x3) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@private0}}, &(0x7f0000000300)=0xe8) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x2000, &(0x7f0000000340)={[{@uid={'uid', 0x3d, r3}}, {@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x33]}}, {@huge_always}, {@size={'size', 0x3d, [0x39, 0x35, 0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x39]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '-k'}}, {@measure}, {@dont_appraise}, {@obj_type={'obj_type', 0x3d, '\x02\''}}]}) 07:59:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x2, 0x1, 0x4084b7c, 0x0, 0x3, 0xfffffffe, 0x119, 0x38, 0x12a, 0x3b, 0x1, 0x20, 0x1, 0x0, 0x58, 0x3f}, [{0x60000006, 0x4, 0x5, 0x7, 0xaffa, 0x3, 0x81, 0x7}, {0x6474e551, 0x3f, 0x6, 0xd4, 0x7, 0xfff, 0x2, 0x9}], "e33fe85ff0c3893746f49767c8fd6b0193d1fab4259a89e7f58f2784d9781c813083b8358034ed", ['\x00', '\x00']}, 0x29f) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) r4 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x1, 0x0, 0x22, 0x7, 0x0, 0x1ff, 0x2004, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x8, @perf_config_ext={0x2, 0x80}, 0x4002, 0x1, 0x2, 0xe, 0xaf, 0x1, 0x1, 0x0, 0x8, 0x0, 0x81}, r0, 0xc, r0, 0x3) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x84800) r7 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r7, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000240)={0xfffff801, 0x0, &(0x7f0000000200)=[r3, r0, r4, r1, 0xffffffffffffffff, r5, r6, r1, r7]}, 0x9) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:38 executing program 4: ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0xfffffffffffffff9, [0x7, 0xdec, 0x9, 0x100, 0x7fff, 0x8]}) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000080)={0x2, 0x0, 0x10}) read(0xffffffffffffffff, &(0x7f0000019340)=""/102400, 0x19000) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x400}}, './file1\x00'}) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$int_out(r1, 0x2, &(0x7f0000000140)) 07:59:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x6, 0x4, 0x0, 0xdac}) 07:59:53 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) (fail_nth: 16) 07:59:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x2, 0x1, 0x4084b7c, 0x0, 0x3, 0xfffffffe, 0x119, 0x38, 0x12a, 0x3b, 0x1, 0x20, 0x1, 0x0, 0x58, 0x3f}, [{0x60000006, 0x4, 0x5, 0x7, 0xaffa, 0x3, 0x81, 0x7}, {0x6474e551, 0x3f, 0x6, 0xd4, 0x7, 0xfff, 0x2, 0x9}], "e33fe85ff0c3893746f49767c8fd6b0193d1fab4259a89e7f58f2784d9781c813083b8358034ed", ['\x00', '\x00']}, 0x29f) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) r4 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x1, 0x0, 0x22, 0x7, 0x0, 0x1ff, 0x2004, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x8, @perf_config_ext={0x2, 0x80}, 0x4002, 0x1, 0x2, 0xe, 0xaf, 0x1, 0x1, 0x0, 0x8, 0x0, 0x81}, r0, 0xc, r0, 0x3) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x84800) r7 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r7, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000240)={0xfffff801, 0x0, &(0x7f0000000200)=[r3, r0, r4, r1, 0xffffffffffffffff, r5, r6, r1, r7]}, 0x9) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7a00) 07:59:53 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x8000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) fcntl$addseals(r0, 0x409, 0xb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000001000000180000005eeefaaa8a6544889f0b330df13532b14350c46d99799e5279cac7eabae7d8795b50c8edc09637c18617ca9f621411591b61d131292bdab80d3b4d260ec4e57b7d1739b77bca5856d4f45b86", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x81, 0x6, 0x2, 0x1f}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x201040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2(&(0x7f0000000140), 0x80000) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) openat(r1, &(0x7f0000000100)='./file1\x00', 0x571440, 0x1) 07:59:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) faccessat2(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x120, 0x300) recvmmsg$unix(r0, &(0x7f0000000e80)=[{{&(0x7f0000000100), 0x6e, &(0x7f0000000180)=[{&(0x7f0000001100)=""/217}], 0x0, &(0x7f00000001c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf9}}, {{&(0x7f0000000280), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000300)=""/237, 0xed}], 0x1, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}, {{&(0x7f0000000580)=@abs, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000600)=""/239, 0xef}, {&(0x7f0000000fc0)=""/95, 0x5f}], 0x2, &(0x7f00000007c0)}}, {{&(0x7f0000000800), 0x6e, &(0x7f0000000d80)=[{&(0x7f0000000880)=""/69, 0x45}, {&(0x7f0000000900)=""/156, 0x9c}, {&(0x7f0000001040)=""/149, 0x95}, {&(0x7f0000000a80)=""/38, 0x26}, {&(0x7f0000000ac0)=""/136, 0x88}, {&(0x7f0000000b80)=""/210, 0xd2}, {&(0x7f0000000c80)=""/241, 0xf1}], 0x7, &(0x7f0000000700)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}], 0x4, 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x6) pipe2(&(0x7f0000000f80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82800) ioctl$FICLONE(r1, 0x40049409, r3) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:53 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x100000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2220.190542] FAULT_INJECTION: forcing a failure. [ 2220.190542] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2220.192615] CPU: 1 PID: 37610 Comm: syz-executor.3 Not tainted 5.10.215 #1 [ 2220.193658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2220.194887] Call Trace: [ 2220.195298] dump_stack+0x107/0x167 [ 2220.195854] should_fail.cold+0x5/0xa [ 2220.196442] __alloc_pages_nodemask+0x182/0x600 [ 2220.197133] ? xa_load+0x12d/0x2c0 [ 2220.197680] ? lock_downgrade+0x6d0/0x6d0 [ 2220.198312] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2220.199235] alloc_pages_current+0x187/0x280 [ 2220.199896] __page_cache_alloc+0x2d2/0x360 [ 2220.200549] page_cache_ra_unbounded+0x207/0x6f0 [ 2220.201257] ? read_pages+0xbc0/0xbc0 [ 2220.201836] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2220.202538] ondemand_readahead+0x8e5/0x1150 [ 2220.203206] page_cache_sync_ra+0x138/0x170 [ 2220.203851] generic_file_buffered_read+0xc8e/0x2920 [ 2220.204624] ? pagecache_get_page+0xc80/0xc80 [ 2220.205295] ? lock_chain_count+0x20/0x20 [ 2220.205918] ? mark_lock+0xf5/0x2df0 [ 2220.206473] ? mark_lock+0xf5/0x2df0 [ 2220.207033] generic_file_read_iter+0x33f/0x490 [ 2220.207737] ? lock_chain_count+0x20/0x20 [ 2220.208363] ext4_file_read_iter+0x184/0x4c0 [ 2220.209027] generic_file_splice_read+0x455/0x6d0 [ 2220.209745] ? pipe_to_user+0x170/0x170 [ 2220.210340] ? _cond_resched+0x12/0x80 [ 2220.210933] ? avc_policy_seqno+0x9/0x70 [ 2220.211543] ? selinux_file_permission+0x92/0x520 [ 2220.212274] ? pipe_to_user+0x170/0x170 [ 2220.212872] do_splice_to+0x10e/0x160 [ 2220.213454] splice_direct_to_actor+0x2fe/0x980 [ 2220.214157] ? pipe_to_sendpage+0x380/0x380 [ 2220.214803] ? do_splice_to+0x160/0x160 [ 2220.215396] ? security_file_permission+0x24e/0x570 [ 2220.216152] do_splice_direct+0x1c4/0x290 [ 2220.216762] ? splice_direct_to_actor+0x980/0x980 [ 2220.217474] ? selinux_file_permission+0x92/0x520 [ 2220.218192] ? security_file_permission+0x24e/0x570 [ 2220.218940] do_sendfile+0x553/0x1090 [ 2220.219516] ? do_pwritev+0x270/0x270 [ 2220.220081] ? wait_for_completion_io+0x270/0x270 [ 2220.220809] ? rcu_read_lock_any_held+0x75/0xa0 [ 2220.221496] ? vfs_write+0x354/0xa70 [ 2220.222062] __x64_sys_sendfile64+0x1d1/0x210 [ 2220.222732] ? __ia32_sys_sendfile+0x220/0x220 [ 2220.223411] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2220.224183] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2220.224944] do_syscall_64+0x33/0x40 [ 2220.225505] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2220.226255] RIP: 0033:0x7f3e376bfb19 [ 2220.226812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2220.229500] RSP: 002b:00007f3e34c35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2220.230615] RAX: ffffffffffffffda RBX: 00007f3e377d2f60 RCX: 00007f3e376bfb19 [ 2220.231651] RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000000000007 [ 2220.232685] RBP: 00007f3e34c351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2220.233733] R10: 000000000020d315 R11: 0000000000000246 R12: 0000000000000002 [ 2220.234776] R13: 00007fffdeab2b1f R14: 00007f3e34c35300 R15: 0000000000022000 07:59:53 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x200000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) r2 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r2, 0x0, 0x0) r3 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = gettid() kcmp(0x0, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r3, r4, 0x18) sendmsg$nl_generic(r1, &(0x7f00000015c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20500080}, 0xc, &(0x7f0000001580)={&(0x7f0000000180)={0x13dc, 0x16, 0x10, 0x70bd2b, 0x25dfdbfe, {0x4}, [@generic="fd56bb9507348da3958b07293aa47913cb773e6923a29a37321974e63d7c126122224b0f7a528fd9f3c1b74847b6ddf4fa5fc2effb402b1ba582ab7e86845ce9365bb5d71c6aba49a90163442fcb5976faf9421790568827ffce59d80bae57e8bab5e7e056fc87bbb06e68425e9aa7536366", @nested={0x50, 0x25, 0x0, 0x1, [@typed={0x39, 0x5a, 0x0, 0x0, @binary="13a4b46e946c1e8aa8e754250d35cc48964d9bca0d22b5c2687976720f33bb98a380a3e57790317a7936b7526e2760abb5d9327bc7"}, @typed={0x8, 0x7b, 0x0, 0x0, @fd=r2}, @typed={0x8, 0x6, 0x0, 0x0, @u32=0x2}]}, @generic="a1a4d8c6e60b92d666d12b5550c0574478efe2a30147cd4ba9e500d0ea2fe5e0ece24411f7a7d21f90d25b854c8eec6c8df5e4dec3c9bd37b44101b650b0e9e7b81944a122d9a17167a7e54a42e3675d1f5bce573e371179207c393a32b08a495cf611d2614fcde27f97d7e050c3a8acf017c003f0610fa11eb250177a83935f3fba16907763a783b53ffb26c14c83c6ad2f", @nested={0x10, 0x62, 0x0, 0x1, [@typed={0xc, 0x65, 0x0, 0x0, @u64=0xffffffff}]}, @typed={0x14, 0x68, 0x0, 0x0, @ipv6=@loopback}, @nested={0x124f, 0x3a, 0x0, 0x1, [@generic="479937bed0214a76692bdf532919f35147fd30552304c439bfe36ccfe033ff21bda289280f5330bb37d8f66aaf8e20ba7c269a1866c4acb3794483b2977c3c7669d464b5c3178c36147b3dd72e97d8945ee84377410721fc62b2c658d9b0d44c583dff126c441ba4196d9f88c888d3e33f268a5f9a0c27eb3041533ffd9e39eaef553b31bcfa0142392caa37c3ac8f870677c3e49bcca62ecd2452ff904179f1226993f6aa15cb4a3e11ce053448d721623eeec7226d74f88b93c5089eb110c891139736bbce", @generic="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", @typed={0x8, 0x89, 0x0, 0x0, @u32=0xffff}, @generic="566371d6431511f8a5715635ac23528c8db4c55460fb4ecbc388f0932c99cb7c99d3e8de9f0b180324c4ccb24a180ab435db551692e9559d417b0ebb3a456a81583d16848333d81c07bc7918bc7a6974d5a37875f17fd3dc6a301e131a6dfbcf21b68d462765b52fcae8dd674c0005b9992571f9825c8acc543e3d7250cbfa27f84e0387c704bbeb2f37", @typed={0x8, 0x63, 0x0, 0x0, @pid=r3}, @typed={0x8, 0xc, 0x0, 0x0, @u32=0x5}, @generic="5722e9ebab9fed75de4b566e1483c1da78af2194837b1108d58e38c0e9042d9e19479d524eb52067c82351b45735cecd119390a7ca8f4d75d1973530837f941c5f41675c2912b27134c6c800f65b78e0b08c7b2e88def192f4007548a8e71a57ebf502e61e730c066e03339b7415d0b67a245caca815bb72a7c273410a10eb42a465a1759ccebdc9e3915afc96c837f8fa766742f273e05f2408361d516c2a4cfd6c132dd0a2a497437284c6a0b4e1d892ad70c98e4537ffc64b936067ea75e08dcdd49ecedff8785c6f486b77fabba83438f1c24b2512ae712600966d9b4c8456da8e"]}]}, 0x13dc}, 0x1, 0x0, 0x0, 0x40}, 0x4044084) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$CDROM_DEBUG(r1, 0x5330, 0x0) 07:59:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x300000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 07:59:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x2, 0x6a, 0x9, 0x0, 0x0, 0x81501, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xf59, 0x1, @perf_bp={&(0x7f00000000c0), 0xd}, 0x1000, 0x5, 0x7fffffff, 0x9, 0x9, 0xd4, 0x2, 0x0, 0x2, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r1, 0x8) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:54 executing program 1: read(0xffffffffffffffff, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) accept4(r1, &(0x7f0000000340)=@isdn, &(0x7f00000003c0)=0x80, 0x0) clone3(&(0x7f0000000000)={0x1048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 07:59:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x80000) 07:59:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x800000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x1000000) 08:00:09 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) (fail_nth: 17) 08:00:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xa00000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = gettid() kcmp(0x0, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r1, r2, 0x18) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x4, 0xff, 0x1d, 0xfe, 0x0, 0x7, 0x2, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x8}, 0x40000, 0x4, 0x926, 0x5, 0x5, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x6b1cc2cb}, r2, 0x5, 0xffffffffffffffff, 0x8) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6847eba0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) pipe(&(0x7f00000010c0)) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) sendmsg$nl_generic(r0, 0x0, 0x10040001) fallocate(r2, 0x10, 0x1, 0x9) fstatfs(r1, &(0x7f00000000c0)=""/4096) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="100200d421d5d007f8d3cf77"]) r5 = fsmount(0xffffffffffffffff, 0x1, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000052c00)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000052e00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053000)={0x376, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6, r8}], 0x6, "5c83c9bf8af498"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000756c0)={0x1000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x3, "d62912066dd958"}) 08:00:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x10041, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/ipc\x00') ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f0000000240)={{r2}, "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"}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x2000, 0x20) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000100), &(0x7f0000000140)='./file1\x00', 0x8, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_io_uring_complete(0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x400000, 0x0) fallocate(r5, 0x10, 0x1000, 0x0) sendfile(r0, r4, &(0x7f00000000c0)=0x7fff, 0x8) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xe00000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2235.641361] FAULT_INJECTION: forcing a failure. [ 2235.641361] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2235.643322] CPU: 0 PID: 38660 Comm: syz-executor.3 Not tainted 5.10.215 #1 [ 2235.644336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2235.645548] Call Trace: [ 2235.645955] dump_stack+0x107/0x167 [ 2235.646498] should_fail.cold+0x5/0xa [ 2235.647075] __alloc_pages_nodemask+0x182/0x600 [ 2235.647761] ? xa_load+0x12d/0x2c0 [ 2235.648294] ? lock_downgrade+0x6d0/0x6d0 [ 2235.648910] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2235.649826] alloc_pages_current+0x187/0x280 [ 2235.650479] __page_cache_alloc+0x2d2/0x360 [ 2235.651128] page_cache_ra_unbounded+0x207/0x6f0 [ 2235.651845] ? read_pages+0xbc0/0xbc0 [ 2235.652407] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2235.653106] ondemand_readahead+0x8e5/0x1150 [ 2235.653794] page_cache_sync_ra+0x138/0x170 [ 2235.654435] generic_file_buffered_read+0xc8e/0x2920 [ 2235.655205] ? pagecache_get_page+0xc80/0xc80 [ 2235.655864] ? lock_chain_count+0x20/0x20 [ 2235.656479] ? mark_lock+0xf5/0x2df0 [ 2235.657036] ? mark_lock+0xf5/0x2df0 [ 2235.657616] generic_file_read_iter+0x33f/0x490 [ 2235.658299] ? lock_chain_count+0x20/0x20 [ 2235.658922] ext4_file_read_iter+0x184/0x4c0 [ 2235.659578] generic_file_splice_read+0x455/0x6d0 [ 2235.660289] ? pipe_to_user+0x170/0x170 [ 2235.660878] ? _cond_resched+0x12/0x80 [ 2235.661470] ? avc_policy_seqno+0x9/0x70 [ 2235.662073] ? selinux_file_permission+0x92/0x520 [ 2235.662797] ? pipe_to_user+0x170/0x170 [ 2235.663390] do_splice_to+0x10e/0x160 [ 2235.663959] splice_direct_to_actor+0x2fe/0x980 [ 2235.664651] ? pipe_to_sendpage+0x380/0x380 08:00:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x1000000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2235.665294] ? do_splice_to+0x160/0x160 [ 2235.666039] ? security_file_permission+0x24e/0x570 [ 2235.666773] do_splice_direct+0x1c4/0x290 [ 2235.667373] ? splice_direct_to_actor+0x980/0x980 [ 2235.668063] ? selinux_file_permission+0x92/0x520 [ 2235.668761] ? security_file_permission+0x24e/0x570 [ 2235.669501] do_sendfile+0x553/0x1090 [ 2235.670064] ? do_pwritev+0x270/0x270 [ 2235.670622] ? wait_for_completion_io+0x270/0x270 [ 2235.671318] ? rcu_read_lock_any_held+0x75/0xa0 [ 2235.671988] ? vfs_write+0x354/0xa70 [ 2235.672524] __x64_sys_sendfile64+0x1d1/0x210 [ 2235.673177] ? __ia32_sys_sendfile+0x220/0x220 [ 2235.673846] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2235.674601] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2235.675328] do_syscall_64+0x33/0x40 [ 2235.675869] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2235.676583] RIP: 0033:0x7f3e376bfb19 [ 2235.677123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2235.679676] RSP: 002b:00007f3e34c35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2235.680767] RAX: ffffffffffffffda RBX: 00007f3e377d2f60 RCX: 00007f3e376bfb19 [ 2235.681782] RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000000000007 [ 2235.682775] RBP: 00007f3e34c351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2235.683770] R10: 000000000020d315 R11: 0000000000000246 R12: 0000000000000002 [ 2235.684766] R13: 00007fffdeab2b1f R14: 00007f3e34c35300 R15: 0000000000022000 08:00:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x4) read(r0, &(0x7f0000019340)=""/102400, 0x19000) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x140, 0x2) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x1, @loopback, 0xd1}, 0x1c) clone3(&(0x7f0000000000)={0x1044000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000140)=[&(0x7f00000000c0)='] \x00'], 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) syz_open_dev$vcsn(&(0x7f0000000200), 0x8, 0x2c081) r3 = syz_open_dev$loop(&(0x7f00000001c0), 0x6, 0x800000) fcntl$dupfd(r2, 0x0, r3) 08:00:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xb, 0x20110, r0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x2, 0x0, @fd=r0, 0x6, 0x0, 0xffffffff, 0x3}, 0x80000000) 08:00:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x1c00000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x80, 0x0) renameat2(r1, &(0x7f0000000180)='./file1\x00', r0, &(0x7f00000001c0)='./file1\x00', 0x2) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000100), 0xae6a7bb6ff17557e}, 0x10000, 0x0, 0x0, 0x0, 0x7, 0xffffffff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) openat(r2, &(0x7f0000000200)='./file1\x00', 0x4200, 0xa3) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x3e00000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:09 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x800, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0xc840}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r2, &(0x7f0000019340)=""/102400, 0x19000) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x8}}, './file1/file0\x00'}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000100)=[r4], 0x1) 08:00:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x2000000) 08:00:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x3000000) 08:00:25 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) (fail_nth: 18) 08:00:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) syz_io_uring_setup(0x7282, &(0x7f0000000100)={0x0, 0x1d5f, 0xc, 0x1, 0x5b}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f00000002c0)={{}, 0x0, 0x2, @unused=[0xffffffffffff71ca, 0x8f91, 0x0, 0x400000004000], @name="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"}) flock(r4, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="0004000072000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xd0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r4, 0x0, 0x0, 0x0, {0x1}, 0xaca8b1330354523d, {0x0, r5}}, 0x9) syz_io_uring_submit(r2, 0x0, &(0x7f0000000200)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, r3, 0x0, 0x0, 0x0, 0x12040, 0x0, {0x3, r5}}, 0x7) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x400, 0x20) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x3f, 0xaf, 0x0, 0x80000001, 0x27b800}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x7f00000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0), 0x4b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0xcc}}, './file0\x00'}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) clone3(&(0x7f0000000140)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) execveat(r1, &(0x7f0000000140)='./file1\x00', &(0x7f0000000200)=[&(0x7f0000000180)='--\x00', &(0x7f00000001c0)='\x00'], &(0x7f00000003c0)=[&(0x7f0000000240)='\\)&\x00', &(0x7f0000000280)='security.capability\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)='\x00'], 0x100) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r3, 0x0, 0x6, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000000c0)=[r3], 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) recvmmsg$unix(r0, &(0x7f0000001b00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/20, 0x14}, {&(0x7f00000001c0)=""/26, 0x1a}, {&(0x7f0000000200)=""/91, 0x5b}, {&(0x7f0000000280)=""/207, 0xcf}, {&(0x7f0000000380)}], 0x5, &(0x7f0000001bc0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="140000fd000000000000000000000001c70db19b31cbd155267ba03e507f", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x70}}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001500)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000015c0), 0x6e, &(0x7f00000019c0)=[{&(0x7f0000001640)=""/152, 0x98}, {&(0x7f0000001700)}, {&(0x7f0000001740)=""/162, 0xa2}, {&(0x7f0000001800)=""/41, 0x29}, {&(0x7f0000001840)=""/136, 0x88}, {&(0x7f0000001900)=""/19, 0x13}, {&(0x7f0000001940)=""/125, 0x7d}], 0x7, &(0x7f0000001a40)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}}], 0x3, 0x62, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x5, 0xfc, 0x8, 0x11, 0x0, 0x4, 0x1, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x400, 0x3, 0x5, 0x1, 0x80, 0x7, 0x9, 0x0, 0x1, 0x0, 0x100000001}, r1, 0xa, r2, 0x0) [ 2251.550933] FAULT_INJECTION: forcing a failure. [ 2251.550933] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2251.553587] CPU: 0 PID: 39820 Comm: syz-executor.3 Not tainted 5.10.215 #1 [ 2251.554719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2251.556034] Call Trace: [ 2251.556578] dump_stack+0x107/0x167 [ 2251.557153] should_fail.cold+0x5/0xa [ 2251.557932] __alloc_pages_nodemask+0x182/0x600 [ 2251.558700] ? xa_load+0x12d/0x2c0 [ 2251.559294] ? lock_downgrade+0x6d0/0x6d0 [ 2251.560122] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2251.561057] alloc_pages_current+0x187/0x280 [ 2251.561946] __page_cache_alloc+0x2d2/0x360 [ 2251.562680] page_cache_ra_unbounded+0x207/0x6f0 [ 2251.563608] ? read_pages+0xbc0/0xbc0 [ 2251.564202] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2251.565147] ondemand_readahead+0x8e5/0x1150 [ 2251.566046] page_cache_sync_ra+0x138/0x170 [ 2251.566713] generic_file_buffered_read+0xc8e/0x2920 [ 2251.567730] ? pagecache_get_page+0xc80/0xc80 [ 2251.568456] ? lock_chain_count+0x20/0x20 [ 2251.569285] ? mark_lock+0xf5/0x2df0 [ 2251.569950] ? mark_lock+0xf5/0x2df0 [ 2251.570687] generic_file_read_iter+0x33f/0x490 [ 2251.571403] ? lock_chain_count+0x20/0x20 [ 2251.572037] ext4_file_read_iter+0x184/0x4c0 [ 2251.572883] generic_file_splice_read+0x455/0x6d0 [ 2251.573618] ? pipe_to_user+0x170/0x170 [ 2251.574401] ? _cond_resched+0x12/0x80 [ 2251.574996] ? avc_policy_seqno+0x9/0x70 [ 2251.575807] ? selinux_file_permission+0x92/0x520 [ 2251.576575] ? pipe_to_user+0x170/0x170 [ 2251.577339] do_splice_to+0x10e/0x160 [ 2251.578094] splice_direct_to_actor+0x2fe/0x980 [ 2251.578908] ? pipe_to_sendpage+0x380/0x380 [ 2251.579608] ? do_splice_to+0x160/0x160 [ 2251.580247] ? security_file_permission+0x24e/0x570 [ 2251.581009] do_splice_direct+0x1c4/0x290 [ 2251.581665] ? splice_direct_to_actor+0x980/0x980 [ 2251.582416] ? selinux_file_permission+0x92/0x520 [ 2251.583187] ? security_file_permission+0x24e/0x570 [ 2251.583950] do_sendfile+0x553/0x1090 [ 2251.584579] ? do_pwritev+0x270/0x270 [ 2251.585205] ? wait_for_completion_io+0x270/0x270 [ 2251.585949] ? rcu_read_lock_any_held+0x75/0xa0 [ 2251.586665] ? vfs_write+0x354/0xa70 [ 2251.587253] __x64_sys_sendfile64+0x1d1/0x210 [ 2251.587968] ? __ia32_sys_sendfile+0x220/0x220 [ 2251.588718] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2251.589594] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2251.590407] do_syscall_64+0x33/0x40 [ 2251.591023] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2251.591821] RIP: 0033:0x7f3e376bfb19 [ 2251.592437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2251.595242] RSP: 002b:00007f3e34c35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2251.596452] RAX: ffffffffffffffda RBX: 00007f3e377d2f60 RCX: 00007f3e376bfb19 [ 2251.597539] RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000000000007 [ 2251.598638] RBP: 00007f3e34c351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2251.599743] R10: 000000000020d315 R11: 0000000000000246 R12: 0000000000000002 [ 2251.600849] R13: 00007fffdeab2b1f R14: 00007f3e34c35300 R15: 0000000000022000 08:00:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xe803000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) dup(r0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(r0, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f000001a440), 0x100) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/misc', 0x40, 0x80) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x6, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 08:00:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) syz_io_uring_setup(0x7282, &(0x7f0000000100)={0x0, 0x1d5f, 0xc, 0x1, 0x5b}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f00000002c0)={{}, 0x0, 0x2, @unused=[0xffffffffffff71ca, 0x8f91, 0x0, 0x400000004000], @name="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"}) flock(r4, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="0004000072000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xd0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r4, 0x0, 0x0, 0x0, {0x1}, 0xaca8b1330354523d, {0x0, r5}}, 0x9) syz_io_uring_submit(r2, 0x0, &(0x7f0000000200)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, r3, 0x0, 0x0, 0x0, 0x12040, 0x0, {0x3, r5}}, 0x7) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xfe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r2 = clone3(&(0x7f0000000000)={0xa000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) utimensat(r4, &(0x7f0000000440)='./file1\x00', &(0x7f0000000480)={{0x77359400}}, 0x0) clone3(&(0x7f0000000380)={0x2000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0x5}, &(0x7f0000000180)=""/209, 0xd1, &(0x7f0000000280)=""/59, &(0x7f0000000340)=[r3, r2], 0x2, {r0}}, 0x58) 08:00:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xf401000000000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f00000000c0)=@v2={0x2000000, [{0xfffffff7, 0x2}, {0x8, 0xffffffff}]}, 0xfffffffffffffeff, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(r0, &(0x7f0000000080)='/proc/self/exe\x00', 0x270040, 0x0) read(r1, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4000000) 08:00:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xfdffffff00000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', 0x7fff, 0x9, &(0x7f00000016c0)=[{&(0x7f0000000200)="055c152b219670834c7d8d6fcf2f139288d7b2b4c90aa2c960a88d77938626c8711be1a5cc84f25466100bcc89902b2c3b89f864710dd7ed90d2d3470b7796b66a778e131046bc471e9b59d96df67877885954ca8249fe5e09e867ffa6358e387134422d8f42411231f85311f964329daea809c4962c0f3f6360166c325d97d3111cf3eaeb89958b1d747ada9df0fc62354ad7f8e561d7638d72c932ab6e069f7609d1071ee1ef7228a5d92e86e95a26f255", 0xb2, 0x8}, {&(0x7f00000002c0)="5e2db93b1487f080c0104a229b5fc06a1a074a3f4e48640b829b92f1558351da1f2a50fcbd1d1d875c9fd7a8", 0x2c, 0x6}, {&(0x7f0000000300)="b98a5465e76f45ac4dc53214525eaef36edef4c69a3d9d7564134d503fa3a5987d0d068cfee8276ebf49edf3d35d9879b044a143d275ef5ad7b615dca4df2587ebae6b2a986ba5c34bdb02cab7fd58c93e8834f3f47791896557defbaa9771cb2711e8be288dbcac351faef07306d4f6d2bfd85f2d86bf6f49dd1466c75b6c780976cccaf89671fc3a56dd8733361dc5d62c953b", 0x94, 0x7}, {&(0x7f00000003c0)="98fe76affa3af6eecb33ac5bfece92f8055dd1b416abbb0e173f41077219c2070922966562476cd92ba5fc33279135be19989b60e535ba49617774c11a91170b374824ab92d411b941531cc1304840b929bfb84bf7e7db729ac8444cd4daf52e3a9308a8f6ae12d7542e1f6b483de996dc9b37d849ac4f92f05d9690429b6a90e650ed75b3124efdd6efbdce369127f16191f3383a7acd5bc721497424ea738c64c0c78449bab9309580a79e016530432cff3726ce09fbf29bf7dbd8415e51410a326496e5b08f1b9b33ca2cc8bccb5a2f0404b769e831c4ee1b3eb9de43a6a2fb6e01", 0xe3, 0x3ff}, {&(0x7f00000004c0)="8879eba7750e54d200ff2f3f3ee5da3c3e812caa44973f03a7550258d1c57dd0cee9ebcc746ad1beba72d1ad5942c2c06c448bda17a0b6ab210c", 0x3a, 0x100}, {&(0x7f0000000500)="2111f28a950c97d6a44a60e72ac269d248f012ecad5949", 0x17, 0xf5}, {&(0x7f0000000540)="576e985f91ddef6ce4cb5d4607acbadeccd69d3a92e8e7e33ea8e4a03c3135b258bcac5c3a5465b5b24d5dff278a292d5bbe8175655f3207758545d65a69a40234bd457da6b1c89a3e7d960007f1d1f1e75c7b983d7788c3316649bddb667a6ec56783ea188006d7d7b8f2207e472f6f0376e1a9cce0595e61da0a3c88250790659368e05804c3a456b6d9d04090db091c9ad2aa9d3477efbec3d743ac792730", 0xa0, 0x1}, {&(0x7f0000000600)="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", 0x1000, 0x82}, {&(0x7f0000001600)="7040f8465ebc8924a0e27ef52eb0b35742a4a6df9182697d6975ee8f32a638845090102bc3386500cd322746d54aa89c2c6a8fcaff3dbfa6a9b2e75b867013710aa130f76139fe09113f3c8d3b13bf901142831b546be55456fa523eb81300883e36fa823675c3385704267096222a4055bc26ae10c31682b0825af04c707c97f14b674dc2a50f9c235220433d5052443d5ba48ec656a3e2c483265649fcfd2fdc0d95b8838bf656", 0xa8, 0xebc}], 0x3098401, &(0x7f00000017c0)={[{@dots}, {@fat=@showexec}], [{@smackfstransmute={'smackfstransmute', 0x3d, ']*'}}, {@hash}, {@pcr={'pcr', 0x3d, 0x20}}]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000001840)={"6778a474f4df8f2b405cc51dd49b7ac8", 0x0, 0x0, {0x7fffffff, 0x11c3}, {0x0, 0x1}, 0x5, [0x1, 0x50, 0x9, 0xfffffffffffffeff, 0x3, 0x2, 0xffff, 0x6, 0x1, 0x2, 0x1, 0x5, 0x2f, 0x6e7, 0xc, 0xfffffffffffffffc]}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000001940)={{r1}, r2, 0x4, @unused=[0xd012, 0xbe9a, 0x101, 0x8e9], @name="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"}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x1, 0xff, 0x2, 0x0, 0x9, 0xc0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0x40556, 0x3, 0x8, 0x8, 0xdf, 0x7, 0x81, 0x0, 0x6, 0x0, 0xfff}, 0x0, 0xe, r0, 0x2) 08:00:41 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:00:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x1, 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) preadv2(r0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/24, 0x18}], 0x1, 0x101, 0x7, 0x13) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x20001) pread64(r1, &(0x7f0000000140)=""/214, 0xd6, 0x1000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x48000, 0x81) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xfeffffff00000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x5000000) 08:00:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000300)={r2, 0x0, "d770622feed8dd55b91ba9ab029647c5a29c7d930d2ff18422c16bded20db90fecc047dae4e053c45653bf0f205a1d658a75d0fc135a1eefbec2fe0e17eeabae5f3f28f87e388656e0d17939617dde3f9acea1f86501ac1853695fca69f66b3a9a1a4f38d60ba4a9195ab67c1ada797a4c7b139b70cfab6b52c2cdb78cbb73a511444788bdbc6d3b170a8f6419cdafba0cd9ef8873f2e387551449f6f21f9bd6ea7fc49eb59939586ee004e5628f1f30fff516afa50510465c8373ca1170b8bb4caaabae61871dd2554a3f214007881cf427e960f0ea77df5da394b6d93c8bcd9cb5fa6d40e1b4b40e25cce2a3e44f118a3801fa779fa14fe6ef73cab8603d87", "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"}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000002, 0x10010, r1, 0x0) syz_io_uring_complete(r3) r4 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r4}, 0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) flock(r8, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r10 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r8, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="6b0e46eb", @ANYRES16=r10, @ANYBLOB="0004000072000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xd0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r8, 0x0, 0x0, 0x0, {0x1}, 0xaca8b1330354523d, {0x0, r9}}, 0x9) syz_io_uring_submit(r5, 0x0, &(0x7f0000001780)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x2004, @fd=r7, 0x1, &(0x7f0000001700)=[{&(0x7f0000001300)=""/235, 0xeb}, {&(0x7f0000001400)=""/154, 0x9a}, {&(0x7f00000014c0)=""/18, 0x12}, {&(0x7f0000001500)=""/218, 0xda}, {&(0x7f0000001600)=""/224, 0xe0}], 0x5, 0x0, 0x0, {0x0, r9}}, 0x4) 08:00:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file1\x00', 0x428620, 0x14) read(r0, &(0x7f0000032340)=""/102386, 0xffffffffffffff7f) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x20300100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x6, 0x0) r3 = socket$inet(0x2, 0xa, 0x9) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000800), 0x10d080, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r4, 0x3312, 0x1) write$binfmt_elf32(r3, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x0, 0x4, 0x1, 0xab3, 0x3, 0x3e, 0xfffffe01, 0x3de, 0x38, 0x1ea, 0xd9, 0x5, 0x20, 0x1, 0x0, 0x1, 0xfff}, [{0x3, 0x4, 0x6, 0x385, 0x1, 0x0, 0x3f, 0xe1af}, {0x1, 0x344, 0x101, 0x4, 0xffffffff, 0xc94, 0x80000001, 0x3}], "1730b17023b2", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x67e) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000140)={0x0, r2, 0x80000001, 0x0, 0x3, 0x1}) 08:00:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4000000) 08:00:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x68) 08:00:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0xc40, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xffffffff00000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x6e8200, 0x4a) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$CDROMMULTISESSION(r2, 0x5310, &(0x7f0000000100)={@msf={0x3f, 0x1, 0x6}}) r3 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = gettid() kcmp(0x0, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r3, r4, 0x18) r5 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r6 = gettid() kcmp(0x0, r6, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r5, r6, 0x18) r7 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r8 = gettid() kcmp(0x0, r8, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r7, r8, 0x18) clone3(&(0x7f00000003c0)={0x1800000, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0), {0x10}, &(0x7f0000000200)=""/196, 0xc4, &(0x7f0000000300)=""/94, &(0x7f0000000380)=[r1, r4, r5, r1, r1, r7], 0x6, {r2}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6000000) 08:00:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYRES32=r2, @ANYRES16=r1, @ANYRES32=r3, @ANYRES16=r3, @ANYRESDEC, @ANYRES64=r0], 0xfdef) r5 = syz_mount_image$nfs4(&(0x7f0000000100), &(0x7f0000000140)='./file1\x00', 0xfff, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="bf90031ed175258aeb85723097900acc927defebc38c70edf76a528ed0d93dde7a941a416e912ba0becb3ca6cd77a8b063acd8e459a5704bb8e6c88e0fafc2dcd8565d6054866daa6b5257821eac5b08365a30107e86cfdc026c44a47240140ffe1b3c6cae92f6203f6e1707eb73fae8bad380c3a69bc0b6873a6e821785ad2eeadda328362a4dd1c039ad5c74d69718526938fd267a7eaba8c5916b18f818dbbc65e64d787444593bf5b363d9fe1bb15b2b463d955171b18d8e475f9f68ad560ebd05a64c4dff5040cf85ed", 0xcc, 0x9}, {&(0x7f0000000280)="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", 0xfc, 0x5}], 0x5000, &(0x7f00000003c0)={[{}, {}, {'\\'}, {'-[#/$[)'}, {'*\xe0'}], [{@permit_directio}, {@euid_lt}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000400)={{0x1, 0x1, 0x18, r5, {0x1}}, './file1\x00'}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0xffffffffffffffff}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x1, 0x8, 0x80000000, 0x7ea, 0x8}) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 1) 08:00:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) mq_open(&(0x7f00000000c0)='\x00', 0x40, 0x40, &(0x7f0000000100)={0x7, 0x59e9, 0x1, 0x4}) 08:00:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000180)=[&(0x7f00000000c0)='%\\&(\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00'], 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000001c0)=0x9) 08:00:56 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d310) 08:00:56 executing program 2: read(0xffffffffffffffff, &(0x7f0000019340)=""/102400, 0x19000) r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x42002, 0x0, 0x92bd, 0x0, 0x8001}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7000000) [ 2282.976893] FAULT_INJECTION: forcing a failure. [ 2282.976893] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.979514] CPU: 1 PID: 42126 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2282.980689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2282.982097] Call Trace: [ 2282.982550] dump_stack+0x107/0x167 [ 2282.983172] should_fail.cold+0x5/0xa [ 2282.983818] ? getname_flags.part.0+0x50/0x4f0 [ 2282.984594] should_failslab+0x5/0x20 [ 2282.985237] kmem_cache_alloc+0x5b/0x310 [ 2282.985940] getname_flags.part.0+0x50/0x4f0 [ 2282.986693] getname_flags+0x9a/0xe0 [ 2282.987325] __x64_sys_execveat+0xd6/0x140 [ 2282.988046] do_syscall_64+0x33/0x40 [ 2282.988678] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2282.989540] RIP: 0033:0x7fb8a0961b19 [ 2282.990187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2282.993264] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2282.994543] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2282.995744] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2282.996939] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2282.998147] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000001 [ 2282.999340] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:00:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0xa006d66aa242c47b, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(r0, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f000001a440), 0x1002) 08:00:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:00:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 2) 08:00:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x9362, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) signalfd(r1, &(0x7f00000000c0)={[0x5]}, 0x8) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:00:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x40) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(r0, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) chroot(&(0x7f0000000340)='./file0/file0\x00') r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000006, 0x8010, r0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000300)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, r1, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)="6191204a8b312c5b8c61f281fcf33f0d823d39d0cfab814cf6969488107333a71285d9918ac51c7b845501a7af891804c93b461d04a5731d2f54067763953768e44604b3dd894d2fd801a51eb9e611920ac3f300f921d9c178f56e5708be612e74a813073f4562f0ac1fb075b2432628529efd2030c81ecba1139a79c80ee2d0cdec26ba8728aa8b35217e4ef06a08afe08f8dec7e2bb7aaf9471aef457da9abed401702e89e712fdfbfbe", 0xab}], 0x1, &(0x7f0000000280)=[{0x28, 0x114, 0xdf2, "703fa9752f61a73327d09994efc1d382a352f7fd6730f090"}], 0x28}, 0x0, 0x400c1}, 0x5) [ 2283.194859] FAULT_INJECTION: forcing a failure. [ 2283.194859] name failslab, interval 1, probability 0, space 0, times 0 [ 2283.195906] CPU: 0 PID: 42640 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2283.196458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2283.197148] Call Trace: [ 2283.197370] dump_stack+0x107/0x167 [ 2283.197832] should_fail.cold+0x5/0xa [ 2283.198162] ? create_object.isra.0+0x3a/0xa20 [ 2283.198531] should_failslab+0x5/0x20 [ 2283.198855] kmem_cache_alloc+0x5b/0x310 [ 2283.199205] create_object.isra.0+0x3a/0xa20 [ 2283.199571] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2283.199977] kmem_cache_alloc+0x159/0x310 [ 2283.200317] getname_flags.part.0+0x50/0x4f0 [ 2283.200679] getname_flags+0x9a/0xe0 [ 2283.200987] __x64_sys_execveat+0xd6/0x140 [ 2283.201337] do_syscall_64+0x33/0x40 [ 2283.201643] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2283.202066] RIP: 0033:0x7fb8a0961b19 [ 2283.202363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2283.203827] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2283.204458] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2283.205051] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2283.205622] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2283.206218] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000001 [ 2283.206789] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:01:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x48000000) 08:01:11 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d311) 08:01:11 executing program 2: ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000100)={0x9, 0x0, 'client0\x00', 0x1, "7892b5dac54600db", "aaa38c0aeb429f6d812d1e96aa16c979a57cde019d00e8d777ddce4dc1cd4abc", 0x8, 0x3}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 3) 08:01:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x10, &(0x7f0000000180)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@cache_none}, {@posixacl}, {@noextend}, {@msize={'msize', 0x3d, 0x8}}, {@fscache}, {@nodevmap}, {@debug={'debug', 0x3d, 0x8}}, {@version_u}], [{@hash}, {@hash}, {@pcr={'pcr', 0x3d, 0x4}}]}}) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x2}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:01:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r1, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r2, r4, &(0x7f0000000340)=@IORING_OP_OPENAT={0x12, 0x1, 0x0, r1, 0x0, &(0x7f0000000280)='./file0\x00', 0x59, 0xe040, 0x31713}, 0x3) fsetxattr$security_capability(r1, &(0x7f0000000200), &(0x7f00000002c0)=@v2={0x2000000, [{0x1ff, 0x6}, {0x1, 0xa91}]}, 0x14, 0x1) r5 = syz_io_uring_complete(r3) clock_gettime(0x4cb2bebf400ec18d, &(0x7f0000000400)) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r6, 0x29, 0x7, &(0x7f0000000880), 0x4) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_OPENAT2={0x1c, 0x4, 0x0, r5, &(0x7f0000000180)={0x22800, 0x40, 0xabfd46e2cc2ff235}, &(0x7f0000000380)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r7}}, 0x2) getdents(r5, &(0x7f00000001c0)=""/52, 0x34) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd=r8, 0xffffffffffff56c0, 0x0, 0x1f}, 0x2) creat(&(0x7f0000000100)='./file0\x00', 0x32) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:01:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=@v1={0x2, "9b03250a04b885073022"}, 0xb, 0x4) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x501200, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2297.705469] FAULT_INJECTION: forcing a failure. [ 2297.705469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2297.707639] CPU: 1 PID: 43078 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2297.708650] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2297.709838] Call Trace: [ 2297.710268] dump_stack+0x107/0x167 [ 2297.710797] should_fail.cold+0x5/0xa [ 2297.711371] strncpy_from_user+0x34/0x470 [ 2297.711974] getname_flags.part.0+0x95/0x4f0 [ 2297.712635] getname_flags+0x9a/0xe0 [ 2297.713204] __x64_sys_execveat+0xd6/0x140 [ 2297.713880] do_syscall_64+0x33/0x40 [ 2297.714507] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2297.715321] RIP: 0033:0x7fb8a0961b19 [ 2297.715861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2297.718518] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2297.719621] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2297.720647] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2297.721690] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2297.722739] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000001 [ 2297.723773] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:01:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:01:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 4) 08:01:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4c000000) 08:01:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, @in_args={0x1}}, './file1\x00'}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x4, 0x5, 0x1400000}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, &(0x7f0000000200)=[&(0x7f0000000240)='\xd5,{&^\x00', &(0x7f0000000280)='!&&-\\&\x00\x02\xde\xde\xe0\xc1\rU\x8a2m\x87n\x87l\x05\xaa\x9f[\xad\xb1\x8d\xe1\xf0\xa7\xd0|\xc7X`\x0e\x8c,\xb5\xcd\a\xfe\x12H\x81\xf9\xb5|4\x12\xbdl\x1c\xa9wl\f\x02\x13M\xa7\xbe\xc7\xde\x98\xc64r\xa5\x11\xc0\b\x98%\'\xdbt\xf8|gr\xb6O\fQ\xad\x8cd\xdc>l\xa7)F>\xac\x13(\xdc\x1bQ8\xff\x16w\xb9\xea\xbb$E\x81zWU\xbd\xbe\x829\xb9e\xbd\xe2@\xc2\xfd\x8cW\xc9\x04\x99\xe3\xe0\xc1\xb2\xc7\xd4>\x97\xa47\x11\xc89u\x94\x85;\x7f\x0f \x10k\xdf\x10>fP\xa2\xd3>\x9b\xb9\xf3\aM\xc63\xe7\xbe\xf5\x98\xe7H\vJ\xe5\x00Jn[by%\xc3\xb1=f\xd0\x10\xb9\x1e\xcb\x8d\x8b>\xdf\x02+\xe6\xe7\x1d&c\xd6\xb3\xa3\x82\xd8\x9dV\x82r\xe9\x9c\xfa2\xc4\xe0*\xd8\x89pA\rF\x96\xbb\xdd\x00\xfcl\x8b\xec\x19', &(0x7f0000000100)='!}/$,-.\xd1#\'\x00', &(0x7f0000000140)='&[/\x00', &(0x7f0000000180)='\x00', &(0x7f0000000040)='Y\x00W\x83,\x88\xa1\\\xf6c\x00\x00\x00\x00'], 0x0) 08:01:11 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file1/file0\x00', 0x6c882, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) io_uring_enter(r0, 0x6da5, 0xc0b8, 0x1, &(0x7f0000000200)={[0x1]}, 0x8) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_setup(0x2ccd, &(0x7f00000000c0)={0x0, 0xea2c, 0x3b3f1437e3b6f67d, 0x1, 0x2e2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd_index=0x6, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xa77) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2298.037333] FAULT_INJECTION: forcing a failure. [ 2298.037333] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.039508] CPU: 1 PID: 43599 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2298.040521] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.041689] Call Trace: [ 2298.042077] dump_stack+0x107/0x167 [ 2298.042615] should_fail.cold+0x5/0xa [ 2298.043179] ? alloc_bprm+0x51/0x8f0 [ 2298.043719] should_failslab+0x5/0x20 [ 2298.044271] kmem_cache_alloc_trace+0x55/0x320 [ 2298.044929] ? lock_downgrade+0x6d0/0x6d0 [ 2298.045535] alloc_bprm+0x51/0x8f0 [ 2298.046053] ? __virt_addr_valid+0x170/0x5c0 [ 2298.046710] do_execveat_common+0x275/0x8d0 [ 2298.047333] ? strncpy_from_user+0x9e/0x470 [ 2298.047954] ? bprm_execve+0x1a60/0x1a60 [ 2298.048557] __x64_sys_execveat+0xed/0x140 [ 2298.049172] do_syscall_64+0x33/0x40 [ 2298.049706] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2298.050453] RIP: 0033:0x7fb8a0961b19 [ 2298.050995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.053618] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2298.054724] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2298.055747] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2298.056770] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2298.057793] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000001 [ 2298.058825] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:01:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) r2 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = gettid() kcmp(0x0, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r2, r3, 0x18) recvmmsg$unix(r0, &(0x7f000000b640)=[{{&(0x7f0000001880), 0x6e, &(0x7f0000006c00)=[{&(0x7f0000005940)=""/4096, 0x1000}, {&(0x7f0000006940)=""/191, 0xbf}, {&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000006a00)=""/203, 0xcb}, {&(0x7f0000001d40)=""/41, 0x29}, {&(0x7f0000006b00)=""/162, 0xa2}, {&(0x7f0000006bc0)=""/51, 0x33}], 0x7, &(0x7f0000006c80)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x90}}, {{&(0x7f0000006d40)=@abs, 0x6e, &(0x7f0000009080)=[{&(0x7f0000006dc0)=""/11, 0xb}, {&(0x7f0000006e00)=""/4096, 0x1000}, {&(0x7f0000007e00)=""/4096, 0x1000}, {&(0x7f0000008e00)=""/184, 0xb8}, {&(0x7f0000008ec0)=""/191, 0xbf}, {&(0x7f0000008f80)=""/197, 0xc5}], 0x6, &(0x7f0000009100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x148}}, {{&(0x7f0000009280)=@abs, 0x6e, &(0x7f0000009680)=[{&(0x7f0000009300)=""/125, 0x7d}, {&(0x7f0000009380)=""/200, 0xc8}, {&(0x7f0000009480)=""/206, 0xce}, {&(0x7f0000009580)=""/204, 0xcc}], 0x4, &(0x7f00000096c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000009700), 0x6e, &(0x7f0000009a40)=[{&(0x7f0000009780)=""/53, 0x35}, {&(0x7f00000097c0)=""/37, 0x25}, {&(0x7f0000009800)=""/244, 0xf4}, {&(0x7f0000009900)=""/42, 0x2a}, {&(0x7f0000009940)=""/226, 0xe2}], 0x5, &(0x7f0000009ac0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f0000009b40), 0x6e, &(0x7f0000009dc0)=[{&(0x7f0000009bc0)=""/94, 0x5e}, {&(0x7f0000009c40)=""/155, 0x9b}, {&(0x7f0000009d00)=""/177, 0xb1}], 0x3, &(0x7f0000009e00)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x120}}, {{&(0x7f0000009f40)=@abs, 0x6e, &(0x7f000000b180)=[{&(0x7f0000009fc0)=""/132, 0x84}, {&(0x7f000000a080)=""/4096, 0x1000}, {&(0x7f000000b080)=""/5, 0x5}, {&(0x7f000000b0c0)=""/22, 0x16}, {&(0x7f000000b100)=""/127, 0x7f}], 0x5}}, {{0x0, 0x0, &(0x7f000000b280)=[{&(0x7f000000b200)=""/78, 0x4e}], 0x1, &(0x7f000000b2c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f000000b300)=@abs, 0x6e, &(0x7f000000b580)=[{&(0x7f000000b380)=""/242, 0xf2}, {&(0x7f000000b480)=""/1, 0x1}, {&(0x7f000000b4c0)}, {&(0x7f000000b500)=""/73, 0x49}], 0x4, &(0x7f000000b5c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}], 0x8, 0x40012001, 0x0) kcmp(r3, r4, 0x6, r0, r1) clock_gettime(0x0, &(0x7f00000057c0)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000005640)=[{{&(0x7f0000000100), 0x6e, &(0x7f0000001540)=[{&(0x7f0000000180)=""/116, 0x74}, {&(0x7f0000000200)=""/251, 0xfb}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/22, 0x16}, {&(0x7f0000001340)=""/104, 0x68}, {&(0x7f00000013c0)=""/165, 0xa5}, {&(0x7f00000019c0)=""/76, 0x4c}, {&(0x7f0000001500)=""/25, 0x19}], 0x8}}, {{&(0x7f00000015c0), 0x6e, &(0x7f0000001480)=[{&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001640)=""/179, 0xb3}, {&(0x7f0000001700)=""/122, 0x7a}, {&(0x7f0000001780)=""/130, 0x82}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/18, 0x12}], 0x6, &(0x7f0000001900)=ANY=[@ANYBLOB="1000000000000000010000000100000020000054742c5cd70fece10000000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x30}}, {{&(0x7f0000001940)=@abs, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000005840)=""/202, 0xca}, {&(0x7f0000001ac0)=""/229, 0xe5}], 0x2, &(0x7f0000001c00)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000001c40)=""/73, 0x49}], 0x1, &(0x7f0000001d00)=[@rights={{0x10}}, @rights={{0x10}}], 0x20}}, {{&(0x7f0000003e00), 0x6e, &(0x7f0000003ec0)=[{&(0x7f0000003e80)=""/24, 0x18}], 0x1, &(0x7f0000003f00)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x98}}, {{&(0x7f0000003fc0), 0x6e, &(0x7f0000005580)=[{&(0x7f0000004040)=""/199, 0xc7}, {&(0x7f0000004140)=""/147, 0x93}, {&(0x7f0000004200)=""/4096, 0x1000}, {&(0x7f0000005200)=""/19, 0x13}, {&(0x7f0000005240)=""/91, 0x5b}, {&(0x7f00000052c0)=""/126, 0x7e}, {&(0x7f0000005340)=""/94, 0x5e}, {&(0x7f00000053c0)=""/221, 0xdd}, {&(0x7f00000054c0)=""/137, 0x89}], 0x9}}], 0x6, 0x0, &(0x7f0000005800)={r5, r6+10000000}) fcntl$setown(r1, 0x8, r7) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x8}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:01:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)={0x4000, 0x11, 0x5}, 0x18) futimesat(r1, &(0x7f0000000140)='./file1/file0\x00', &(0x7f0000000180)={{0x0, 0x2710}, {0x0, 0x2710}}) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)={0x20400, 0xa9, 0xebb1b2b6d0beccd4}, 0x18) openat(r1, &(0x7f0000000180)='./file1\x00', 0x800, 0x40) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f00000001c0)=0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xc742}}, './file1\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 5) 08:01:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x68000000) 08:01:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/152, 0x98, 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xa}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:01:25 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d314) [ 2312.050636] FAULT_INJECTION: forcing a failure. [ 2312.050636] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.053246] CPU: 1 PID: 44238 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2312.054403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.055675] Call Trace: [ 2312.056092] dump_stack+0x107/0x167 [ 2312.056658] should_fail.cold+0x5/0xa [ 2312.057257] ? create_object.isra.0+0x3a/0xa20 [ 2312.057971] should_failslab+0x5/0x20 [ 2312.058571] kmem_cache_alloc+0x5b/0x310 [ 2312.059212] create_object.isra.0+0x3a/0xa20 [ 2312.059901] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2312.060740] kmem_cache_alloc_trace+0x151/0x320 [ 2312.061467] ? lock_downgrade+0x6d0/0x6d0 [ 2312.062120] alloc_bprm+0x51/0x8f0 [ 2312.062687] ? __virt_addr_valid+0x170/0x5c0 [ 2312.063519] do_execveat_common+0x275/0x8d0 [ 2312.064235] ? strncpy_from_user+0x9e/0x470 [ 2312.064990] ? bprm_execve+0x1a60/0x1a60 [ 2312.065662] __x64_sys_execveat+0xed/0x140 [ 2312.066409] do_syscall_64+0x33/0x40 [ 2312.066992] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2312.067845] RIP: 0033:0x7fb8a0961b19 [ 2312.068447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.071494] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2312.072799] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2312.073950] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2312.075140] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2312.076233] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000001 [ 2312.077525] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:01:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 6) 08:01:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xe}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:01:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6c000000) 08:01:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r1}, 0x0) r4 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r4}, 0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) r8 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000005c0), 0xc, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYRESOCT, @ANYRES16=r8, @ANYBLOB="010029bd7000fcdbdf25040000004404004e24000014000300000000000000000000000000000000000c0007003000000004000000080005000400000008000b0e736970000600eeff5900000038000280060002004e2100000800090000000000080006f54f00000014000100e00000020000fcb24ef267eaff2e0000000000000000000008000900090000001c0003800800030000000000080001000100000008000100020000000800040b200000004c000280080006000300000005000d00010000000800050005001c283171ff89dec201000800070086000000080009007c000000080004000900000006"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x44) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r8, 0xffc4dbf9b013a53b, 0x70bd27, 0x7fffffff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4804) flock(r7, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r10 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r7, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="6b0e46eb", @ANYRES16=r10, @ANYBLOB="0004000072000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xd0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r7, 0x0, 0x0, 0x0, {0x1}, 0xaca8b1330354523d, {0x0, r9}}, 0x9) syz_io_uring_submit(r2, r6, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x4007, @fd_index, 0x4, 0xab5c, 0x1, 0xa, 0x0, {0x1, r9}}, 0x3) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x6) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x1, 0xa0600) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r3, 0x4, 0x6, 0x0) ftruncate(r3, 0xfffffffffffffffd) r4 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r4}, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f00000002c0)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r1, &(0x7f0000000200)=0x80, &(0x7f0000000240)=@alg, 0x0, 0x80000}, 0xfffffc01) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) sendmsg$nl_generic(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x38, 0x20, 0x70bd2c, 0x25dfdbff, {0x1c}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x44800) clone3(&(0x7f0000000000)={0x81060100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2312.281164] FAULT_INJECTION: forcing a failure. [ 2312.281164] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.282278] CPU: 0 PID: 44677 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2312.282920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.283582] Call Trace: [ 2312.283796] dump_stack+0x107/0x167 [ 2312.284091] should_fail.cold+0x5/0xa [ 2312.284390] should_failslab+0x5/0x20 [ 2312.284705] __kmalloc_track_caller+0x79/0x370 [ 2312.285050] ? kasprintf+0xbb/0xf0 [ 2312.285344] ? __lockdep_reset_lock+0x180/0x180 [ 2312.285697] kvasprintf+0xb5/0x150 [ 2312.285991] ? bust_spinlocks+0xe0/0xe0 [ 2312.286315] ? kmem_cache_alloc_trace+0x151/0x320 [ 2312.286719] kasprintf+0xbb/0xf0 [ 2312.286995] ? kvasprintf_const+0x1a0/0x1a0 [ 2312.287320] ? trace_hardirqs_on+0x5b/0x180 [ 2312.287682] alloc_bprm+0x10f/0x8f0 [ 2312.287982] ? __virt_addr_valid+0x170/0x5c0 [ 2312.288342] do_execveat_common+0x275/0x8d0 [ 2312.288693] ? strncpy_from_user+0x9e/0x470 [ 2312.289042] ? bprm_execve+0x1a60/0x1a60 [ 2312.289380] __x64_sys_execveat+0xed/0x140 [ 2312.289726] do_syscall_64+0x33/0x40 [ 2312.290011] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2312.290430] RIP: 0033:0x7fb8a0961b19 [ 2312.290733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.292060] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2312.292671] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2312.293247] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2312.293766] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2312.294351] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000001 [ 2312.294921] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:01:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 7) 08:01:26 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x10}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:01:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2312.428212] FAULT_INJECTION: forcing a failure. [ 2312.428212] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.429150] CPU: 0 PID: 44929 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2312.429651] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.430259] Call Trace: [ 2312.430487] dump_stack+0x107/0x167 [ 2312.430758] should_fail.cold+0x5/0xa [ 2312.431076] should_failslab+0x5/0x20 [ 2312.431395] __kmalloc_track_caller+0x79/0x370 [ 2312.431780] ? kasprintf+0xbb/0xf0 [ 2312.432076] ? __lockdep_reset_lock+0x180/0x180 [ 2312.432468] kvasprintf+0xb5/0x150 [ 2312.432760] ? bust_spinlocks+0xe0/0xe0 [ 2312.433091] ? kmem_cache_alloc_trace+0x151/0x320 [ 2312.433489] kasprintf+0xbb/0xf0 [ 2312.433770] ? kvasprintf_const+0x1a0/0x1a0 [ 2312.434133] ? trace_hardirqs_on+0x5b/0x180 [ 2312.434504] alloc_bprm+0x10f/0x8f0 [ 2312.434809] ? __virt_addr_valid+0x170/0x5c0 [ 2312.435186] do_execveat_common+0x275/0x8d0 [ 2312.435538] ? strncpy_from_user+0x9e/0x470 [ 2312.435899] ? bprm_execve+0x1a60/0x1a60 [ 2312.436242] __x64_sys_execveat+0xed/0x140 [ 2312.436588] do_syscall_64+0x33/0x40 [ 2312.436897] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2312.437325] RIP: 0033:0x7fb8a0961b19 [ 2312.437631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.439144] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2312.439767] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2312.440368] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2312.440945] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2312.441519] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000001 [ 2312.442105] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:01:26 executing program 4: read(0xffffffffffffffff, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x2f, 0x5, 0x6, 0x0, 0x3, 0x6, 0x7f, 0x45, 0x40, 0x10f, 0x7fff, 0x800, 0x38, 0x1, 0x9, 0x2, 0x5}, [{0x2, 0x0, 0x61f031b4, 0x76, 0x1, 0x5c, 0x1f, 0x1}], "50c9c6189532163dd88c8b736e95c3ec86ae8ff5a8aa4fa1de46e32e10bb10965aba7b280b34eff364f2676a51a89fd59a77d0f3e6c954d898dbc1ec325045171446851c62f782d156af0adc80988d7a76d84144cd13236ddbc5cd", ['\x00', '\x00']}, 0x2d3) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000000c0)=[r1, r2], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x40000}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xee01}}, './file1\x00'}) sendmsg$nl_generic(r3, &(0x7f0000001580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001540)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1350}, 0x1, 0x0, 0x0, 0x44001}, 0x8404) execveat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0xd81a) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r1, 0xc0109414, &(0x7f0000000100)={0x410, 0x0, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 8) 08:01:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), &(0x7f0000000140)="63be9e", 0x3, 0x3) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = gettid() kcmp(0x0, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r1, r2, 0x18) syz_open_procfs(r2, &(0x7f00000000c0)='net/udplite6\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2312.660717] FAULT_INJECTION: forcing a failure. [ 2312.660717] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.661845] CPU: 0 PID: 45390 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2312.662360] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.662960] Call Trace: [ 2312.663164] dump_stack+0x107/0x167 [ 2312.663456] should_fail.cold+0x5/0xa [ 2312.663748] ? mm_alloc+0x19/0xd0 [ 2312.664033] should_failslab+0x5/0x20 [ 2312.664324] kmem_cache_alloc+0x5b/0x310 [ 2312.664623] mm_alloc+0x19/0xd0 [ 2312.664876] alloc_bprm+0x1cb/0x8f0 [ 2312.665175] ? __virt_addr_valid+0x170/0x5c0 [ 2312.665542] do_execveat_common+0x275/0x8d0 [ 2312.665897] ? strncpy_from_user+0x9e/0x470 [ 2312.666215] ? bprm_execve+0x1a60/0x1a60 [ 2312.666533] __x64_sys_execveat+0xed/0x140 [ 2312.666875] do_syscall_64+0x33/0x40 [ 2312.667156] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2312.667573] RIP: 0033:0x7fb8a0961b19 [ 2312.667860] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.669202] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2312.669878] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2312.670557] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2312.671161] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2312.671743] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000001 [ 2312.672331] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:01:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x74000000) 08:01:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xfe, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x282, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/7, 0x7}, {&(0x7f0000000100)=""/172, 0xac}], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:40 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d316) 08:01:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000140)=[&(0x7f0000000080)='--\x00', &(0x7f0000000100)='^+],%\x00'], 0x800) 08:01:40 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x1c}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:01:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 9) 08:01:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x88000, 0x41) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) signalfd4(r1, &(0x7f00000000c0), 0x8, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2327.365348] FAULT_INJECTION: forcing a failure. [ 2327.365348] name failslab, interval 1, probability 0, space 0, times 0 [ 2327.367464] CPU: 0 PID: 45762 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2327.368530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2327.369800] Call Trace: [ 2327.370215] dump_stack+0x107/0x167 [ 2327.370792] should_fail.cold+0x5/0xa [ 2327.371383] ? create_object.isra.0+0x3a/0xa20 [ 2327.372092] should_failslab+0x5/0x20 [ 2327.372684] kmem_cache_alloc+0x5b/0x310 [ 2327.373315] create_object.isra.0+0x3a/0xa20 [ 2327.374022] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2327.374818] kmem_cache_alloc+0x159/0x310 [ 2327.375468] mm_alloc+0x19/0xd0 [ 2327.375983] alloc_bprm+0x1cb/0x8f0 [ 2327.376549] ? __virt_addr_valid+0x170/0x5c0 [ 2327.377235] do_execveat_common+0x275/0x8d0 [ 2327.377903] ? strncpy_from_user+0x9e/0x470 [ 2327.378578] ? bprm_execve+0x1a60/0x1a60 [ 2327.379224] __x64_sys_execveat+0xed/0x140 [ 2327.379891] do_syscall_64+0x33/0x40 [ 2327.380464] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2327.381246] RIP: 0033:0x7fb8a0961b19 [ 2327.381823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2327.384626] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2327.385799] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2327.386903] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2327.387990] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2327.389081] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000001 [ 2327.390172] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:01:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0xffffffffffffff9e) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000000c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000100)={{}, 0x0, 0x0, @unused=[0xffffffff80000000, 0xfffffffffffffffa, 0x101, 0xfffffffffffffffc], @devid=r3}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000740)={{}, 0x0, 0x0, @unused=[0x3ff, 0x7, 0xccd5, 0x400], @devid=r3}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000003600)={r3, "bc46c62ff074a1370e1c0a24a8851ec4"}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f00000004c0)={0x18, 0x3, {0x2, @struct={0xd1, 0xffffffe6}, r1, 0x1f, 0x9, 0x401, 0x33d, 0xdc, 0x221, @struct={0xa4, 0x7f}, 0xfff, 0x0, [0x0, 0x7, 0x20a6, 0x6, 0x93, 0x3]}, {0x0, @usage=0xf29, r3, 0x4, 0x266aee8e, 0x1000000000000000, 0x4, 0x7, 0xc0, @struct={0x80000000}, 0x8, 0x0, [0x0, 0x7fff, 0x7, 0x9, 0x5f9, 0x1]}, {0x3, @struct={0x36a, 0x56}, 0x0, 0x8, 0x0, 0x6, 0xdd99, 0x9, 0x8, @struct={0x7, 0x6}, 0x1, 0x100, [0x2, 0x0, 0x4, 0x10001, 0x1, 0x6dbf]}, {0x8, 0x248000000, 0x8000}}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:01:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7a000000) 08:02:00 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x3e}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:02:00 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0xffffffff000) 08:02:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x84c018, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, '/dev/random\x00'}}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@smackfsroot={'smackfsroot', 0x3d, '^\x10\\'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt}, {@fsname={'fsname', 0x3d, '/-'}}]}}) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000005, 0x10, 0xffffffffffffffff, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0), 0x42000, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x5, 0x0, @fd=r4, 0x0, 0x0, 0x0, {}, 0x0, {0x0, r5}}, 0x40) 08:02:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan0\x00'}) r3 = syz_open_dev$vcsa(&(0x7f0000000140), 0x1c, 0x100) openat(r3, &(0x7f0000000180)='./file1\x00', 0x412001, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000280)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x5c, r2, 0x800, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x1ff}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xf01e}, @NL80211_ATTR_NOACK_MAP={0x6}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x80}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x58d3}, @NL80211_ATTR_NOACK_MAP={0x6}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x1}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x10000, 0x10) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x1, 0x0, 0x0, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f00000000c0)={0x3c0a0000, 0x0, 0x0, 0x0, {0x3a}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 10) 08:02:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0xffffff7f) [ 2346.546652] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=46446 comm=syz-executor.4 [ 2346.598710] FAULT_INJECTION: forcing a failure. [ 2346.598710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2346.601907] CPU: 1 PID: 46449 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2346.603893] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.606122] Call Trace: [ 2346.606774] dump_stack+0x107/0x167 [ 2346.607684] should_fail.cold+0x5/0xa [ 2346.608638] __alloc_pages_nodemask+0x182/0x600 [ 2346.609778] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2346.611252] alloc_pages_current+0x187/0x280 [ 2346.612287] __get_free_pages+0xc/0xa0 [ 2346.613233] pgd_alloc+0x84/0x4e0 [ 2346.614008] ? pgd_page_get_mm+0x40/0x40 [ 2346.615022] ? lockdep_init_map_type+0x2c7/0x780 [ 2346.616299] ? lockdep_init_map_type+0x2c7/0x780 [ 2346.617310] mm_init+0x670/0xab0 [ 2346.618016] mm_alloc+0xa2/0xd0 [ 2346.618788] alloc_bprm+0x1cb/0x8f0 [ 2346.619626] ? __virt_addr_valid+0x170/0x5c0 [ 2346.620669] do_execveat_common+0x275/0x8d0 [ 2346.621678] ? strncpy_from_user+0x9e/0x470 [ 2346.622696] ? bprm_execve+0x1a60/0x1a60 [ 2346.623686] __x64_sys_execveat+0xed/0x140 [ 2346.624684] do_syscall_64+0x33/0x40 [ 2346.625561] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2346.626765] RIP: 0033:0x7fb8a0961b19 [ 2346.627796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.632296] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2346.634056] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2346.635725] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2346.637397] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2346.639149] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2346.640803] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:02:00 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x1f4}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:02:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x4, 0xfffffff9}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) 08:02:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xeb1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:00 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x300}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:02:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f00000001c0)={&(0x7f0000000100)=""/156, 0x9c, 0x9, 0x1}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:00 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x3e8}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:02:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7fffffefe000) 08:02:00 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000005c0), 0xc, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYRESOCT, @ANYRES16=r0, @ANYRESOCT=r0], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x44) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x100010, r1, 0x8000000) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="80070700a75fbb1867258ebd9a3b11e1a0a8f4e3473cabe12d0708323c1524f5b0f3aaaef4faff09c9a70b92badc5beb090981407c4c5a6150441ef3749c3ab0f9bd93f985142f5b3dd1246629969063520ac67bfa3b1b9863c64682d4357f0c2996a7a061497dd3579c72637b401ad3576b7e40d1bd7afc98f48e4356", @ANYRES16=r0, @ANYBLOB="080027bd7000fcdbdf250a0000002c00028008000400a40800000800050082cf0000080005000000000008003d39b81d000008000800018000083800028014000100ac1414bb000000000000000000000000080006000300000008000600bf01000008000800164900000800080066e400000c000280060002004e2000003c00018006000100020000000800050004000000080005000400000006000200b300000008000b0073697000060004004e200000080009002500000008000601000000000800050001030000", @ANYRES32=r0], 0xd0}, 0x1, 0x0, 0x0, 0x4008000}, 0x8000) read(0xffffffffffffffff, &(0x7f0000019340)=""/102400, 0x19000) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000540)=0xfff, 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) io_uring_enter(r1, 0x3164, 0xd1cf, 0x2, &(0x7f0000000500)={[0xe9]}, 0x8) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r2, &(0x7f00000004c0)={&(0x7f0000000000), 0xc, &(0x7f0000000480)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032cbd7000ffdbdf254c00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00580028000000000000000c0058004b000000160800bc"], 0x34}}, 0x1) clone3(&(0x7f0000000400)={0x45044100, 0x0, 0x0, 0x0, {0x1000002}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x88, r0, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2b}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x40}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xff}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x88}, 0x1, 0x0, 0x0, 0x4241bbc262a88572}, 0x40) 08:02:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 11) [ 2347.291715] FAULT_INJECTION: forcing a failure. [ 2347.291715] name failslab, interval 1, probability 0, space 0, times 0 [ 2347.295748] CPU: 1 PID: 47184 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2347.297954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2347.300660] Call Trace: [ 2347.301518] dump_stack+0x107/0x167 [ 2347.302706] should_fail.cold+0x5/0xa [ 2347.303929] ? vm_area_alloc+0x1c/0x110 [ 2347.305199] should_failslab+0x5/0x20 [ 2347.306433] kmem_cache_alloc+0x5b/0x310 [ 2347.307834] vm_area_alloc+0x1c/0x110 [ 2347.309119] alloc_bprm+0x337/0x8f0 [ 2347.310324] ? __virt_addr_valid+0x170/0x5c0 [ 2347.311806] do_execveat_common+0x275/0x8d0 [ 2347.313265] ? strncpy_from_user+0x9e/0x470 [ 2347.314945] ? bprm_execve+0x1a60/0x1a60 [ 2347.316368] __x64_sys_execveat+0xed/0x140 [ 2347.317790] do_syscall_64+0x33/0x40 [ 2347.319081] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2347.320845] RIP: 0033:0x7fb8a0961b19 [ 2347.322086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2347.328348] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2347.330994] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2347.333364] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2347.335805] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2347.338267] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2347.340718] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:02:19 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 12) 08:02:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x40, 0x0, 0x15, 0x1, 0x0, 0x1, 0x40514, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x8, 0x8}, 0x10000, 0x10001, 0x1, 0x0, 0x5, 0x400, 0x5, 0x0, 0x2, 0x0, 0xfffffffffffffffa}, r0, 0xe, r0, 0x1) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x4, 0x0, 0x2, 0x200, 0x7ff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r2 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f00000001c0)={0x0, 0x0, 0x1}) fcntl$lock(r0, 0x2, &(0x7f00000000c0)={0x2, 0x0, 0x5d4, 0x4, r2}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x8000000000000) 08:02:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c48d8b052cae4f70000005e00c50100000000000000000000020008"], 0x1c}}, 0x0) read(r0, &(0x7f0000019340)=""/102395, 0x18ffb) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fstat(r0, &(0x7f0000000140)) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xa00}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:02:19 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='\x00', 0x0, 0x5a) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f00000000c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) copy_file_range(r0, &(0x7f0000000100)=0x1000, r0, 0x0, 0x1f, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x44c00) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r0) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f00000001c0)={0x320, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x8c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x316a}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x81}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x26fb}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x773}, @TIPC_NLA_CON_FLAG={0x8}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}]}, @TIPC_NLA_SOCK={0x90, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10000}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x101}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x58}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffe00}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xb0000000}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x58cf}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x164, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7407}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x6, @mcast1, 0x3ff}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x20, @dev={0xfe, 0x80, '\x00', 0x3b}, 0xff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x7f, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x8001, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x68f6}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x22}}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x20, @empty, 0x7f}}, {0x14, 0x2, @in={0x2, 0x4e22, @remote}}}}]}, @TIPC_NLA_BEARER={0x70, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @private=0xa010100}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x72f3e121}]}]}, 0x320}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:19 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x242201, 0x1a4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000000c0)={0x2000000}) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) [ 2365.872427] FAULT_INJECTION: forcing a failure. [ 2365.872427] name failslab, interval 1, probability 0, space 0, times 0 [ 2365.876081] CPU: 0 PID: 47497 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2365.877607] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2365.880178] Call Trace: [ 2365.880979] dump_stack+0x107/0x167 [ 2365.882048] should_fail.cold+0x5/0xa [ 2365.883152] ? create_object.isra.0+0x3a/0xa20 [ 2365.884384] should_failslab+0x5/0x20 [ 2365.885420] kmem_cache_alloc+0x5b/0x310 [ 2365.886535] create_object.isra.0+0x3a/0xa20 [ 2365.887535] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2365.888687] kmem_cache_alloc+0x159/0x310 [ 2365.889751] vm_area_alloc+0x1c/0x110 [ 2365.890771] alloc_bprm+0x337/0x8f0 [ 2365.891729] ? __virt_addr_valid+0x170/0x5c0 [ 2365.892884] do_execveat_common+0x275/0x8d0 [ 2365.894025] ? strncpy_from_user+0x9e/0x470 [ 2365.895171] ? bprm_execve+0x1a60/0x1a60 [ 2365.896256] __x64_sys_execveat+0xed/0x140 [ 2365.897390] do_syscall_64+0x33/0x40 [ 2365.898374] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2365.899877] RIP: 0033:0x7fb8a0961b19 [ 2365.900875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2365.905795] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2365.907777] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2365.909582] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2365.911463] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2365.913305] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2365.914898] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:02:19 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000140)=0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='map_files\x00') readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:02:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:02:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000140)=0x1) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) openat(r0, &(0x7f0000000100)='./file1\x00', 0x220842, 0x32) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x7, 0x3, 0x6}) 08:02:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x14ce2, 0x0) ftruncate(r2, 0x1000003) openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x20000, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='net/ip_tables_matches\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x8d7}}, './file1\x00'}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0xe0efffff7f0000) 08:02:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0xffffffff}, 0x0, 0xffffffffffffffe5, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r2, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRESOCT=r1], 0x1c}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000100)={0x8, 0x1, 0x7, 0xa0, 0x6}) 08:02:19 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 13) [ 2366.502639] FAULT_INJECTION: forcing a failure. [ 2366.502639] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2366.506312] CPU: 0 PID: 48121 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2366.508171] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2366.510582] Call Trace: [ 2366.511392] dump_stack+0x107/0x167 [ 2366.512429] should_fail.cold+0x5/0xa [ 2366.513559] __alloc_pages_nodemask+0x182/0x600 [ 2366.514992] ? __lockdep_reset_lock+0x180/0x180 [ 2366.516362] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2366.518165] ? add_mm_counter_fast+0x220/0x220 [ 2366.519623] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2366.521189] alloc_pages_current+0x187/0x280 [ 2366.522526] get_zeroed_page+0x14/0xb0 [ 2366.523701] __pud_alloc+0x33/0x270 [ 2366.524801] handle_mm_fault+0x1a73/0x3500 [ 2366.526086] ? lock_chain_count+0x20/0x20 [ 2366.527382] ? __pmd_alloc+0x5e0/0x5e0 [ 2366.528584] __get_user_pages+0x6ec/0x1620 [ 2366.529928] ? follow_page_mask+0x1900/0x1900 [ 2366.531335] ? __lockdep_reset_lock+0x180/0x180 [ 2366.532748] __get_user_pages_remote+0x1d5/0x870 [ 2366.534167] ? __might_fault+0xd3/0x180 [ 2366.535595] get_user_pages_remote+0x63/0x90 [ 2366.536918] get_arg_page+0xba/0x200 [ 2366.538008] ? acct_arg_size+0xe0/0xe0 [ 2366.539162] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2366.540592] ? count.constprop.0+0x1b3/0x290 [ 2366.541964] copy_string_kernel+0x1b4/0x450 [ 2366.543438] do_execveat_common+0x525/0x8d0 [ 2366.544648] ? bprm_execve+0x1a60/0x1a60 [ 2366.545799] __x64_sys_execveat+0xed/0x140 [ 2366.547110] do_syscall_64+0x33/0x40 [ 2366.548230] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2366.549802] RIP: 0033:0x7fb8a0961b19 [ 2366.550941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2366.556609] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2366.558941] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2366.561122] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2366.563342] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2366.565554] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2366.567734] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:02:39 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x1c00}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:02:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 14) 08:02:39 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:02:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x2000040, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none}, {@version_u}], [{@appraise}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '['}}, {@context={'context', 0x3d, 'staff_u'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@dont_measure}, {@fowner_gt={'fowner>', r2}}, {@euid_gt={'euid>', r3}}]}}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fallocate(r0, 0x20, 0x8000, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000300), 0x800) 08:02:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x100000000000000) 08:02:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40020, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000064b40)={0x0, 0x0, "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", "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"}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/16]) r3 = fsmount(0xffffffffffffffff, 0x1, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000052c00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000052e00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053000)={0x376, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4, r5}], 0x6, "5c83c9bf8af498"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000065b40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000065d40)={{0x0, 0x3f, 0x8, 0x6ed722e2, 0xfffffffffffffffa, 0x7, 0x7, 0x242, 0x9, 0x1, 0x6, 0x1, 0xfff0000000000000, 0xffffffff, 0xb3}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/16]) r9 = fsmount(0xffffffffffffffff, 0x1, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000052c00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000052e00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053000)={0x376, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10, r11}], 0x6, "5c83c9bf8af498"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000066d40)={0x81, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {r4, r6}, {r7}, {r10}], 0x2, "c1abe9ca229020"}) 08:02:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='1\x00\x00\x00\x00\x00']) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x1c, 0x5, 0xff, "ecb440519fb56e1018751ee2a34185ab", "069ab43deffe06"}, 0x1c, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x2000, 0x0) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2386.137555] FAULT_INJECTION: forcing a failure. [ 2386.137555] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2386.141751] CPU: 0 PID: 48441 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2386.143933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2386.146518] Call Trace: [ 2386.147328] dump_stack+0x107/0x167 [ 2386.148087] should_fail.cold+0x5/0xa [ 2386.149200] __alloc_pages_nodemask+0x182/0x600 [ 2386.150564] ? lock_acquire+0x197/0x470 [ 2386.151713] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2386.152278] ? lock_downgrade+0x6d0/0x6d0 [ 2386.152652] ? do_raw_spin_lock+0x121/0x260 [ 2386.153065] alloc_pages_current+0x187/0x280 [ 2386.153481] __pmd_alloc+0x37/0x5e0 [ 2386.153823] handle_mm_fault+0x1ac4/0x3500 [ 2386.154222] ? lock_chain_count+0x20/0x20 [ 2386.154627] ? __pmd_alloc+0x5e0/0x5e0 [ 2386.155013] __get_user_pages+0x6ec/0x1620 [ 2386.155456] ? follow_page_mask+0x1900/0x1900 [ 2386.155885] ? __lockdep_reset_lock+0x180/0x180 [ 2386.156339] __get_user_pages_remote+0x1d5/0x870 [ 2386.156783] ? __might_fault+0xd3/0x180 [ 2386.157172] get_user_pages_remote+0x63/0x90 [ 2386.157594] get_arg_page+0xba/0x200 [ 2386.157938] ? acct_arg_size+0xe0/0xe0 [ 2386.158306] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2386.158762] ? count.constprop.0+0x1b3/0x290 [ 2386.159178] copy_string_kernel+0x1b4/0x450 [ 2386.159590] do_execveat_common+0x525/0x8d0 [ 2386.160006] ? bprm_execve+0x1a60/0x1a60 [ 2386.160418] __x64_sys_execveat+0xed/0x140 [ 2386.160861] do_syscall_64+0x33/0x40 [ 2386.161243] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2386.161772] RIP: 0033:0x7fb8a0961b19 [ 2386.162159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2386.164046] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2386.164833] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2386.165544] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2386.166247] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2386.166968] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2386.167682] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:02:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffb5) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:39 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x3e00}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:02:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = gettid() syz_open_procfs(r1, &(0x7f00000000c0)='status\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:58 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071e3, 0x2, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:02:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x7f00}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:02:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x200000000000000) 08:02:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x5e, 0x41000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x81e9}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) clone3(&(0x7f0000000140)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x401, 0x7ff}, {0x400, 0x3}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYRES64], 0xfdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0xfffffb) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000480), 0x399000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000380)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x2, &(0x7f00000003c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}, {@noextend}, {@uname={'uname', 0x3d, 'security.capability\x00'}}, {@access_any}, {@access_user}, {@loose}], [{@fowner_lt={'fowner<', r4}}, {@appraise_type}]}}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 15) 08:02:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x40800, 0x0) r2 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r4, 0x0, 0x6, 0x100000000) poll(&(0x7f0000000300)=[{r2, 0x420}, {r3, 0xc0}, {r4, 0x41}, {r1, 0x100}, {r0, 0x464}], 0x5, 0x912) fchmodat(r1, &(0x7f0000000280)='./file1\x00', 0x23) r5 = openat$incfs(r0, &(0x7f00000000c0)='.pending_reads\x00', 0x2000, 0x4) sendmsg$NL80211_CMD_SET_PMKSA(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800ea00", @ANYRES16=0x0, @ANYBLOB="02002bbd7000fbdbdf25340000000c009900000200003a00000006003400c0aa0000140055000ea59932a544bd565a31385e3deae6240a0006005050505050500000"], 0x48}, 0x1, 0x0, 0x0, 0x41}, 0x84) 08:02:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) execveat(r1, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000180)=[&(0x7f00000000c0)='\x00', &(0x7f0000000140)='security.capability\x00'], 0x0) 08:02:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x5, 0x1, 0x1, 0x0, 0x39f, 0x10204, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000100)}, 0x1d418, 0x1ff, 0xfffffffe, 0x8, 0xfbe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r2 = syz_io_uring_setup(0x2203, &(0x7f00000001c0)={0x0, 0x4616, 0x1, 0x2, 0x32e, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)=0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000a80)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r0, 0x0, &(0x7f0000000a40)={&(0x7f00000002c0)=@vsock, 0x80, &(0x7f0000000900)=[{&(0x7f0000000340)=""/122, 0x7a}, {&(0x7f00000003c0)=""/194, 0xc2}, {&(0x7f00000004c0)=""/143, 0x8f}, {&(0x7f0000000580)=""/64, 0x40}, {&(0x7f00000005c0)=""/33, 0x21}, {&(0x7f0000000600)=""/232, 0xe8}, {&(0x7f0000000700)=""/114, 0x72}, {&(0x7f0000000780)=""/85, 0x55}, {&(0x7f0000000800)=""/216, 0xd8}], 0x9, &(0x7f00000009c0)=""/128, 0x80}, 0x0, 0x10000}, 0x7) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000000c0)=ANY=[@ANYBLOB="000300"/12, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r4, 0x0, 0x6, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e00c5d500000000000000008ceb2fac6687154a00000000"], 0x1c}}, 0x0) r6 = socket$inet6(0xa, 0x5, 0x7) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000b00)={0x2, 0x0, &(0x7f0000000ac0)=[r4, 0xffffffffffffffff, r1, r5, r2, r6, r7]}, 0x7) [ 2405.132328] 9pnet: Insufficient options for proto=fd [ 2405.197085] FAULT_INJECTION: forcing a failure. [ 2405.197085] name failslab, interval 1, probability 0, space 0, times 0 [ 2405.198555] CPU: 1 PID: 49288 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2405.199207] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2405.199994] Call Trace: [ 2405.200259] dump_stack+0x107/0x167 [ 2405.200607] should_fail.cold+0x5/0xa [ 2405.200967] ? __pmd_alloc+0x94/0x5e0 [ 2405.201369] ? __pmd_alloc+0x94/0x5e0 [ 2405.201735] should_failslab+0x5/0x20 [ 2405.202100] kmem_cache_alloc+0x5b/0x310 [ 2405.202495] __pmd_alloc+0x94/0x5e0 [ 2405.202846] handle_mm_fault+0x1ac4/0x3500 [ 2405.203265] ? __pmd_alloc+0x5e0/0x5e0 [ 2405.203682] __get_user_pages+0x6ec/0x1620 [ 2405.204098] ? follow_page_mask+0x1900/0x1900 [ 2405.204531] ? __lockdep_reset_lock+0x180/0x180 [ 2405.204971] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2405.205478] __get_user_pages_remote+0x1d5/0x870 [ 2405.205928] ? __might_fault+0xd3/0x180 [ 2405.206322] get_user_pages_remote+0x63/0x90 [ 2405.206746] get_arg_page+0xba/0x200 [ 2405.207106] ? acct_arg_size+0xe0/0xe0 [ 2405.207489] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2405.207945] ? count.constprop.0+0x1b3/0x290 [ 2405.208374] copy_string_kernel+0x1b4/0x450 [ 2405.208794] do_execveat_common+0x525/0x8d0 [ 2405.209215] ? bprm_execve+0x1a60/0x1a60 [ 2405.209618] __x64_sys_execveat+0xed/0x140 [ 2405.210026] do_syscall_64+0x33/0x40 [ 2405.210387] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2405.210868] RIP: 0033:0x7fb8a0961b19 [ 2405.211226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2405.212930] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2405.213654] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2405.214350] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2405.215013] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2405.215690] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2405.216359] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:02:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xe803}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:02:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x0) r2 = dup2(r1, r0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000100)={0x101, 0x2, 0x6}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x4, 0x400, 0x1}) 08:02:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x4) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 16) 08:02:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) 08:02:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x300000000000000) 08:02:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x40100, 0x0, 0x0, 0x0, {0x39}, 0x0, 0x0, 0x0, 0x0, 0xfe1278fe22287f82}, 0x3a) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:02:59 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xf401}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2405.659567] FAULT_INJECTION: forcing a failure. [ 2405.659567] name failslab, interval 1, probability 0, space 0, times 0 [ 2405.661078] CPU: 1 PID: 49834 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2405.661714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2405.662496] Call Trace: [ 2405.662748] dump_stack+0x107/0x167 [ 2405.663113] should_fail.cold+0x5/0xa [ 2405.663474] ? __pmd_alloc+0x94/0x5e0 [ 2405.663828] should_failslab+0x5/0x20 [ 2405.664178] kmem_cache_alloc+0x5b/0x310 [ 2405.664550] __pmd_alloc+0x94/0x5e0 [ 2405.664883] handle_mm_fault+0x1ac4/0x3500 [ 2405.665283] ? lock_chain_count+0x20/0x20 [ 2405.665658] ? __pmd_alloc+0x5e0/0x5e0 [ 2405.666041] __get_user_pages+0x6ec/0x1620 [ 2405.666444] ? follow_page_mask+0x1900/0x1900 [ 2405.666853] ? __lockdep_reset_lock+0x180/0x180 [ 2405.667285] __get_user_pages_remote+0x1d5/0x870 [ 2405.667736] ? __might_fault+0xd3/0x180 [ 2405.668116] get_user_pages_remote+0x63/0x90 [ 2405.668523] get_arg_page+0xba/0x200 [ 2405.668864] ? acct_arg_size+0xe0/0xe0 [ 2405.669217] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2405.669756] ? count.constprop.0+0x1b3/0x290 [ 2405.670159] copy_string_kernel+0x1b4/0x450 [ 2405.670559] do_execveat_common+0x525/0x8d0 [ 2405.670956] ? bprm_execve+0x1a60/0x1a60 [ 2405.671356] __x64_sys_execveat+0xed/0x140 [ 2405.671766] do_syscall_64+0x33/0x40 [ 2405.672150] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2405.672621] RIP: 0033:0x7fb8a0961b19 [ 2405.672970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2405.674681] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2405.675387] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2405.676057] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2405.676723] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2405.677442] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2405.678118] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:03:18 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:03:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) flock(r1, 0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="6b0e46eb", @ANYRES16=r3, @ANYBLOB="0004000072000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xd0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r1, 0x0, 0x0, 0x0, {0x1}, 0xaca8b1330354523d, {0x0, r2}}, 0x9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x2007, @fd_index=0x4, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x1, {0x0, r2}}, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) read(r0, &(0x7f0000000180)=""/244, 0xf4) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)) 08:03:18 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x80000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:03:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, @in_args={0x4}}, '\x00'}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x400000000000000) 08:03:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 17) 08:03:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) [ 2424.980655] FAULT_INJECTION: forcing a failure. [ 2424.980655] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2424.982199] CPU: 1 PID: 50334 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2424.982861] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2424.983764] Call Trace: [ 2424.984038] dump_stack+0x107/0x167 [ 2424.984399] should_fail.cold+0x5/0xa [ 2424.984865] __alloc_pages_nodemask+0x182/0x600 [ 2424.985359] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2424.985934] ? find_held_lock+0x2c/0x110 [ 2424.986335] ? __pmd_alloc+0x2db/0x5e0 [ 2424.986724] ? lock_downgrade+0x6d0/0x6d0 [ 2424.987143] ? do_raw_spin_lock+0x121/0x260 [ 2424.987573] alloc_pages_current+0x187/0x280 [ 2424.988179] pte_alloc_one+0x16/0x1a0 [ 2424.988556] __pte_alloc+0x1d/0x330 [ 2424.988918] handle_mm_fault+0x287f/0x3500 [ 2424.989336] ? lock_chain_count+0x20/0x20 [ 2424.989745] ? __pmd_alloc+0x5e0/0x5e0 [ 2424.990152] __get_user_pages+0x6ec/0x1620 [ 2424.990577] ? follow_page_mask+0x1900/0x1900 [ 2424.991020] ? __lockdep_reset_lock+0x180/0x180 [ 2424.991488] __get_user_pages_remote+0x1d5/0x870 [ 2424.991969] ? __might_fault+0xd3/0x180 [ 2424.992369] get_user_pages_remote+0x63/0x90 [ 2424.992805] get_arg_page+0xba/0x200 [ 2424.993174] ? acct_arg_size+0xe0/0xe0 [ 2424.993557] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2424.994017] ? count.constprop.0+0x1b3/0x290 [ 2424.994452] copy_string_kernel+0x1b4/0x450 [ 2424.994889] do_execveat_common+0x525/0x8d0 [ 2424.995314] ? bprm_execve+0x1a60/0x1a60 [ 2424.995738] __x64_sys_execveat+0xed/0x140 [ 2424.996160] do_syscall_64+0x33/0x40 [ 2424.996529] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2424.997023] RIP: 0033:0x7fb8a0961b19 [ 2424.997388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2424.999125] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2424.999882] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2425.000569] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2425.001248] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2425.001937] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2425.002623] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:03:18 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:03:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000032340)=""/102394, 0x18ffa) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x1, 0x88483) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001740)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x2, 0x0}, &(0x7f00000015c0)="1d9aaf5d9336", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) write$binfmt_script(r3, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\xa3:[&+(-(!'}, {0x20, '\x00'}, {0x20, '/dev/sg#\x00'}], 0xa, "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"}, 0x11e) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x500000000000000) 08:03:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000000}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = gettid() kcmp(0x0, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r1, r2, 0x18) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf9, 0xce, 0x4, 0x1, 0x0, 0xef8, 0x91aa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, @perf_config_ext={0x6, 0x1}, 0x10000, 0xffffffffffff0001, 0x5, 0x5, 0x6, 0x1, 0xcd, 0x0, 0x6}, r1, 0x10, r3, 0x0) 08:03:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 18) 08:03:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102397, 0x18ffd) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010002000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) openat(r1, &(0x7f0000000100)='./file1\x00', 0x10000, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000140)=0x1, 0x1) dup2(r1, r2) 08:03:18 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2425.415461] FAULT_INJECTION: forcing a failure. [ 2425.415461] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.418744] CPU: 1 PID: 50870 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2425.420535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2425.422433] Call Trace: [ 2425.423029] dump_stack+0x107/0x167 [ 2425.423877] should_fail.cold+0x5/0xa [ 2425.424744] ? ptlock_alloc+0x1d/0x70 [ 2425.425629] should_failslab+0x5/0x20 [ 2425.426499] kmem_cache_alloc+0x5b/0x310 [ 2425.427438] ptlock_alloc+0x1d/0x70 [ 2425.428285] pte_alloc_one+0x68/0x1a0 [ 2425.429159] __pte_alloc+0x1d/0x330 [ 2425.430024] handle_mm_fault+0x287f/0x3500 [ 2425.431038] ? __pmd_alloc+0x5e0/0x5e0 [ 2425.431972] __get_user_pages+0x6ec/0x1620 [ 2425.433192] ? follow_page_mask+0x1900/0x1900 [ 2425.434224] ? __lockdep_reset_lock+0x180/0x180 [ 2425.435294] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2425.436336] __get_user_pages_remote+0x1d5/0x870 [ 2425.437413] ? __might_fault+0xd3/0x180 [ 2425.438314] get_user_pages_remote+0x63/0x90 [ 2425.439321] get_arg_page+0xba/0x200 [ 2425.440191] ? acct_arg_size+0xe0/0xe0 [ 2425.441080] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2425.442171] ? count.constprop.0+0x1b3/0x290 [ 2425.443516] copy_string_kernel+0x1b4/0x450 [ 2425.444511] do_execveat_common+0x525/0x8d0 [ 2425.445502] ? bprm_execve+0x1a60/0x1a60 [ 2425.446437] __x64_sys_execveat+0xed/0x140 [ 2425.447406] do_syscall_64+0x33/0x40 [ 2425.448259] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2425.449424] RIP: 0033:0x7fb8a0961b19 [ 2425.450260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2425.454700] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2425.456448] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2425.458075] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2425.459687] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2425.461314] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2425.462930] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:03:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r0, &(0x7f00000000c0)={0x4840, 0x80, 0x12}, &(0x7f0000000100)='./file1\x00', 0x18, 0x0, 0x12345}, 0x8001) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:37 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r0, 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000300)=""/231) openat(r3, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r2, 0x0, r1, 0x0, 0x10001, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r1, r4, 0x0, 0x20d315) 08:03:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 19) 08:03:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001200), 0x44000, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000001280), 0x20000, 0x0) r6 = dup2(r0, r1) r7 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000014c0)='./binderfs2/custom0\x00', 0x2, 0x0) io_submit(0x0, 0x6, &(0x7f0000001600)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000100)="5fd907b40f4ff06e13260090b5", 0xd, 0x2, 0x0, 0x3, r0}, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x3, 0x0, r2, &(0x7f0000000180)="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", 0x1000, 0x0, 0x0, 0x1, r3}, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x3, 0x0, r1, &(0x7f00000011c0)="5c6e7566276ec0cd37a71caa755970fd31dca32a6fc721b20a9c0a6a67262a2e6038999d9d14204c801be873af2591ac429ee8c4", 0x34, 0x8, 0x0, 0x1, r4}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x3, 0x0, r5, &(0x7f00000012c0)="48295b6713b14c1bda5c57fa2f041adae722b69779fe1928a584801c85e4b4891f69f2d9c0a0f5f27ef83c297e7b6051b7ed8d48f607f489902b1236aecfc7d71170d763ec2dde003c1b679cc815ef36372584c8ed1ec33b96efc2b6de1b7efef20cb886a3116e31198083f3e2f3526b4c6a1dce07af", 0x76, 0x6, 0x0, 0x0, r6}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x3ff, r0, &(0x7f0000001380)="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", 0xff, 0x7, 0x0, 0x3, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x2, 0x1000, r7, &(0x7f0000001500)="ca71f5df502d7a200f1f8effefad509bc8d26850815d5b341c171aafbb8662ccf19c2a78f4d1de5fa2ad1bb4f2ec438ad464a3bf676a53f4bb1f31fd097dad746dd9b44d92019527d0d4e54b430c1556ebcee68bf80749183160bc6331c0018cf4068632d1fb171f3499a579753c6b7916c4cc69311e59c9a7374afe21b4dc07b9b446c6bc25f2018c01ac1cb867f1192309d22bccaf34ce387ad3c671bdfe0dc6f539c4", 0xa4, 0xed2, 0x0, 0x1}]) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r0, 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f00000000c0)={'vlan0\x00', 0x818}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x101000, 0x49) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x40000, 0x0) read(r1, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000640), 0x300, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000680)={@loopback, @mcast2, @remote, 0x7, 0xfeff, 0xfffd, 0xd00, 0x0, 0x2a0029}) fallocate(r2, 0x0, 0x6, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) syz_mount_image$iso9660(&(0x7f0000000700), &(0x7f0000000740)='./file1\x00', 0x7fff, 0x0, &(0x7f0000000a40), 0x0, &(0x7f0000000b00)={[{@uid}], [{@smackfstransmute={'smackfstransmute', 0x3d, '@]{+:#!'}}, {@subj_type}, {@fsmagic={'fsmagic', 0x3d, 0x9f72}}, {@appraise}, {@euid_lt={'euid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_gt}]}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_generic(r2, &(0x7f0000000600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000bc0)={0x504, 0x37, 0x300, 0x70bd2c, 0x25dfdbff, {0x16}, [@nested={0x128, 0x95, 0x0, 0x1, [@generic="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", @typed={0x8, 0x76, 0x0, 0x0, @uid=r5}, @typed={0x8, 0x92, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x14, 0x71, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, @nested={0x315, 0x3d, 0x0, 0x1, [@generic="5be4fa4d7fd61453f7b6b263c9b756d29fc930a92f0356309359511ccf", @generic="e9fe140ec623311b9b1dbf35d033d2015e88e2f342c411793a6100edc84005d76fafd5f4eb6af7932b1ed1b5a18d776018dd519f4c7adc3d3f25e727a56d12bff066fd690fc8bfc03b6c484f9d2f1a20e31df65c6dad5dce79499ffc2a2df91232cae77044f322e7f626f3d58d9bc80c129892aaa419bacfc5de55b5e55591d3ec26ed537b58367638aff87beeb6fe48c4db1042ac4fc6a312e25d5665d334650178d7f66324ca22f0d79b6b610409d29594155adf42f5ee67e4b3c55bc33d13a9780b93cb0d8b77a0bb9aad53f8141449163057e6ee528eb9be68382606396ffb5e92ddb0402472579b3289803e557e2ae5cdf4e6d69da12edd2ffe753d", @generic="2f27de13f2e0df45102f276e366a2b99428ebbed86934793fab2292f304564a04a998795c9a317a2b0a2829f6ed6e839917c15c16f1e4da1f5c64b4bbe011c9c31bd0e5505d2bcff1b4aaaf1043518132cd2fb615cece69b2258afa40cca92c15afc12af931e4510c297fa7e7fbd784c", @generic="d79e45f1a03ac0c145d30051d1fcea7c280d5a877aae10cc16d173512eb1d1b1a7f0c61056c2a2b0f62c5ff4aab0acb5446c1bc019b110ce735b5ec5df12ca6f8ed02db40838b2257d620db183c69684bc58562dd9df38d57c81b2b8dea4c09e71863a4e209bc8a41141610ae4a41c6c13b88b31127eb9f26ab77a4b0f22c1e8526bab9d2541ca5185ae7826c932eab1835582b006495e324ba9822f26014ef1aeb364f0b28d6cbdcea959ab458b1c8738804e02a267f7a0cef3eeb1a00acb2205f9a05b58ac65e2a9408c32cc34defbecd5c2160354589002a291a0e5ccdbed11ab366615513819a0c0021e17283b991e927787035a", @typed={0x14, 0x67, 0x0, 0x0, @ipv6=@empty}, @generic="3b84572d2821f24b61cf31701072f0614ebc34192f239c36f7044b99ad61d5b53a299164b72b1be17a67b0027d9f1140df114d4312a00d1a62a13a9509b8ad3bfc6c6e9190c7830e63b1b823dbfb0d3fc0456f204915703a9e76281c0c2f95", @generic="559edecbf73cf6a8fd72fd1917", @generic="8a26e5f4e6c9bcda5b9e146fd41ec69f"]}, @typed={0x8, 0xa, 0x0, 0x0, @u32=0x9}, @generic="44ea95ba0eb9f588bd2ca732941aff3a2b05ac4c3ac0b6e2bda3c275e203758b0e07c10b9f1da70762e91033e87b632a6bf8f68a35e521ffbfb6179a28c5d1897770ad2c1e837e346e551f985d56f1f33252cdcda54901d00caaefdff28b7b764579a6500aec9b60a6e3281fb2d90a82b683865928dcaf73b42be40879d8af0a49934fce126c", @nested={0xc, 0x89, 0x0, 0x1, [@typed={0x8, 0x26, 0x0, 0x0, @uid=r4}]}, @typed={0x14, 0x5b, 0x0, 0x0, @ipv6=@loopback}]}, 0x504}, 0x1, 0x0, 0x0, 0x20000044}, 0x8044) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x600000000000000) 08:03:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) chdir(&(0x7f00000000c0)='./file1\x00') 08:03:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2444.276747] FAULT_INJECTION: forcing a failure. [ 2444.276747] name failslab, interval 1, probability 0, space 0, times 0 [ 2444.280149] CPU: 1 PID: 51405 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2444.283941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2444.284798] Call Trace: [ 2444.285070] dump_stack+0x107/0x167 [ 2444.285494] should_fail.cold+0x5/0xa [ 2444.285879] ? create_object.isra.0+0x3a/0xa20 [ 2444.286323] should_failslab+0x5/0x20 [ 2444.286785] kmem_cache_alloc+0x5b/0x310 [ 2444.287181] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2444.288260] create_object.isra.0+0x3a/0xa20 [ 2444.288688] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2444.289192] kmem_cache_alloc+0x159/0x310 [ 2444.289600] ptlock_alloc+0x1d/0x70 [ 2444.289966] pte_alloc_one+0x68/0x1a0 [ 2444.290347] __pte_alloc+0x1d/0x330 [ 2444.290709] handle_mm_fault+0x287f/0x3500 [ 2444.291135] ? __pmd_alloc+0x5e0/0x5e0 [ 2444.291545] __get_user_pages+0x6ec/0x1620 [ 2444.291996] ? follow_page_mask+0x1900/0x1900 [ 2444.292436] ? __lockdep_reset_lock+0x180/0x180 [ 2444.292896] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2444.293338] __get_user_pages_remote+0x1d5/0x870 [ 2444.293792] ? __might_fault+0xd3/0x180 [ 2444.294177] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2444.294691] get_user_pages_remote+0x63/0x90 [ 2444.295128] get_arg_page+0xba/0x200 [ 2444.295490] ? acct_arg_size+0xe0/0xe0 [ 2444.295892] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2444.296366] ? count.constprop.0+0x1b3/0x290 [ 2444.296808] copy_string_kernel+0x1b4/0x450 [ 2444.297245] do_execveat_common+0x525/0x8d0 [ 2444.297676] ? bprm_execve+0x1a60/0x1a60 [ 2444.298101] __x64_sys_execveat+0xed/0x140 [ 2444.298518] do_syscall_64+0x33/0x40 [ 2444.298882] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2444.299382] RIP: 0033:0x7fb8a0961b19 [ 2444.299749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2444.301510] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2444.302250] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2444.302934] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2444.303790] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2444.304570] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2444.305255] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:03:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x8000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:03:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x20000014}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x700000000000000) 08:03:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r0, 0x8000000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x103000, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x10000, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_mmap}, {@cache_loose}, {@mmap}, {@cache_none}, {@cache_loose}, {@noextend}, {@cachetag={'cachetag', 0x3d, '^&'}}], [{@measure}, {@appraise}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, '@[)/&'}}, {@appraise_type}, {@permit_directio}, {@smackfsdef={'smackfsdef', 0x3d, '{-^^{}\''}}]}}) 08:03:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 20) 08:03:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) symlinkat(&(0x7f0000000100)='./file1\x00', r1, &(0x7f0000000140)='./file1/file0\x00') 08:03:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) sendto(r0, &(0x7f00000000c0)="922abaffa6296181e9e1", 0xa, 0x0, &(0x7f0000000100)=@in6={0xa, 0x4e23, 0x1, @mcast2, 0x2}, 0x80) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) recvmmsg(r1, &(0x7f0000005680)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/176, 0xb0}], 0x1}, 0x9}, {{&(0x7f0000000380)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000400)=""/184, 0xb8}, {&(0x7f0000001640)=""/167, 0xa7}, {&(0x7f0000001700)=""/75, 0x4b}, {&(0x7f0000001780)=""/63, 0x3f}, {&(0x7f00000017c0)=""/111, 0x6f}], 0x6, &(0x7f00000018c0)=""/148, 0x94}, 0x3}, {{&(0x7f0000001980)=@x25={0x9, @remote}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000001a00)=""/1, 0x1}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000002a40)=""/224, 0xe0}, {&(0x7f0000002b40)=""/226, 0xe2}, {&(0x7f0000002c40)=""/202, 0xca}, {&(0x7f0000002d40)=""/82, 0x52}, {&(0x7f0000002dc0)}], 0x7, &(0x7f0000002e80)=""/208, 0xd0}, 0x1000}, {{&(0x7f0000002f80)=@l2, 0x80, &(0x7f0000005280)=[{&(0x7f0000003000)=""/253, 0xfd}, {&(0x7f0000003100)=""/45, 0x2d}, {&(0x7f0000003140)=""/4096, 0x1000}, {&(0x7f0000004140)=""/218, 0xda}, {&(0x7f0000004240)=""/24, 0x18}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x6}, 0x23e4}, {{&(0x7f0000005300)=@sco={0x1f, @none}, 0x80, &(0x7f00000055c0)=[{&(0x7f0000005380)=""/249, 0xf9}, {&(0x7f0000005480)=""/43, 0x2b}, {&(0x7f00000054c0)=""/101, 0x65}, {&(0x7f0000005540)=""/100, 0x64}], 0x4, &(0x7f0000005600)=""/111, 0x6f}, 0x2}], 0x5, 0xcdd15cbf16ccff51, &(0x7f00000057c0)={0x77359400}) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0), 0x8000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000002dc0)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5, 0x800}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$HIDIOCGUSAGES(r3, 0xd01c4813, &(0x7f0000005800)={{0x1, 0xffffffff, 0x6, 0x3416, 0xffff2b37, 0x1}, 0x26d, [0x2, 0xfffffeff, 0x4b9, 0x80000000, 0x7, 0x7, 0xfffffffd, 0xffffffff, 0x100, 0x101, 0x8000, 0x2, 0x0, 0x5, 0x7, 0x1, 0x7, 0x9, 0x7, 0x19c3, 0x5780ed2c, 0xb4b, 0x7, 0x81, 0x200, 0x1, 0x2c, 0x80, 0x2cd1b6f6, 0x1ff, 0x71ca, 0x0, 0x800, 0x4, 0xffff, 0x8, 0x9, 0x7, 0x2, 0xa, 0x2, 0x0, 0x7, 0x2, 0x4, 0x800, 0x0, 0x9, 0x5, 0x4, 0x401, 0x2, 0x81, 0x7, 0x2, 0x1, 0x7, 0x1, 0x0, 0x5, 0x3ff, 0x0, 0x7, 0x1000, 0xfffffffe, 0xffff885e, 0x7, 0xbc9a, 0x6, 0x9, 0x1, 0x0, 0x4, 0x10000, 0xffffffff, 0x4, 0x1, 0x2, 0x8001, 0x6, 0x800, 0x2, 0x94c7, 0x2, 0x1, 0xfffffc01, 0x10000, 0xffff, 0x81, 0x5, 0x9, 0x0, 0x21d, 0x9, 0x3b30, 0xfffffffd, 0x5, 0x3, 0xffff8001, 0x3, 0x8, 0x4d, 0x3, 0xd9fa, 0x200, 0x0, 0x8000, 0x3, 0x10000, 0x1f, 0x8, 0x401, 0x3, 0xcebf38a, 0xbaed, 0x4, 0x58, 0x0, 0x48f2, 0x7f, 0xc5, 0xfffffff7, 0x6f, 0x8, 0x2, 0x3, 0x0, 0x101, 0x80000001, 0x2, 0x5, 0x0, 0x2, 0x0, 0x0, 0x7, 0x7fffffff, 0x8, 0x7fff, 0x0, 0x1, 0x3cbd, 0x7ff, 0x1, 0x7, 0x80, 0x200, 0x7, 0xff, 0x7, 0xfffffffc, 0x9, 0x401, 0x6, 0x3, 0x8001, 0x93f0, 0x0, 0x3f, 0x9, 0x4, 0x2, 0x0, 0x4, 0x10001, 0x7cf9, 0x8000, 0x200, 0xfff, 0x401, 0xfffffeff, 0x37d, 0x4, 0x0, 0x0, 0x101, 0xbe, 0x7ff, 0x400, 0x7f, 0x0, 0x0, 0x0, 0x6, 0x7ff, 0x101, 0x6, 0x5, 0x0, 0x400, 0x4, 0xffff0001, 0xc, 0xb64f, 0x1, 0x59f, 0x3, 0xfffffffc, 0x5, 0x9, 0x4, 0x9, 0x40, 0x2, 0x6, 0x8, 0x3, 0x7fffffff, 0xff, 0x67, 0x1, 0x1, 0x3, 0x3b3, 0xffff, 0x7fffffff, 0x3, 0xfffff562, 0x8000, 0x3ff, 0x3f9, 0x9, 0xffff, 0x1, 0x3, 0x1, 0x3, 0xfffffffc, 0x10000, 0x8, 0x4, 0x8, 0x4, 0x7, 0x7ff, 0x83, 0x2, 0x6, 0xc7, 0x0, 0x6, 0x1, 0xffffffff, 0x2, 0x800, 0x800, 0xa8, 0x80000000, 0x2, 0x7, 0x9, 0x9, 0x3, 0x10001, 0x3, 0x40, 0xff, 0xaf6, 0xffff0001, 0x7, 0x9, 0x1, 0x8001, 0x0, 0xe936, 0x5, 0xe9, 0x4, 0x7fff, 0x80, 0x1, 0x55, 0xffffffff, 0x3ff, 0x8, 0x6, 0x1000, 0x1, 0xffffff81, 0x3, 0x100, 0x2, 0x9, 0x5440, 0x0, 0x8, 0x7, 0x1, 0x207, 0x9, 0x6, 0x8, 0x1f, 0x1, 0x7, 0x3, 0x7, 0xa85, 0x5, 0x100, 0x1000, 0xb8, 0x5b, 0x100, 0xc8a, 0x3, 0x4, 0x3, 0x0, 0x8a1c, 0x9, 0x5, 0x0, 0x5, 0xfff, 0x6f0c, 0x80000001, 0x82db, 0x0, 0x6c, 0x7fffffff, 0x2a92, 0x800, 0x263, 0x88, 0x7fff, 0x5, 0x5, 0x80000000, 0x4, 0x800, 0x2, 0x400, 0x8000, 0x0, 0x8, 0x6, 0x81, 0x80000001, 0xcc8, 0x1, 0x5, 0xff, 0x1, 0x4, 0xfff, 0x1, 0x2, 0x9, 0x3, 0xd5, 0x9, 0x6, 0xffffffff, 0x101, 0x7fff, 0x40, 0x9, 0x3f, 0xfffffa6e, 0x9f45, 0x2, 0x5, 0x1, 0x4600, 0x40, 0x7ff, 0xffffffff, 0x8000, 0xc, 0x8001, 0x3, 0x8, 0xb50, 0x9, 0x0, 0x401, 0x10001, 0x2, 0x80000001, 0x2, 0x401, 0x3, 0xfff, 0x6, 0x8, 0x9, 0xfffffffa, 0x9, 0x3, 0x3ff, 0x6, 0x6, 0x2, 0x8, 0x3, 0xfffff7c6, 0x643, 0x4f, 0x3, 0x6, 0x80000001, 0x10001, 0xffffb067, 0x83e, 0x2, 0x4, 0xffffff3c, 0x9, 0x4, 0x88af, 0x8001, 0x1, 0x8000, 0xff, 0x8, 0x7fffffff, 0x80, 0x3, 0x0, 0x1f, 0x0, 0x200, 0x0, 0x7, 0xfffd, 0x3f, 0x9, 0x1, 0x59c, 0x10000, 0x6, 0x0, 0x1, 0x5, 0x5, 0x800, 0x1, 0x4, 0x265a6ace, 0x7f, 0x10001, 0x400, 0xffff, 0x0, 0x6, 0x2, 0xffff6846, 0xfde, 0x1000, 0x1000, 0xff78, 0x8000, 0xc61, 0x3, 0x1c, 0x7, 0x3, 0x9, 0x6, 0x1, 0xfcb, 0x101, 0x7fff, 0x7, 0x1, 0x40, 0x5, 0x400000, 0x5, 0xffffff80, 0x5, 0x3, 0x1, 0x4, 0xffff, 0x7, 0x101, 0x7, 0x11, 0x8, 0x5, 0xcc5, 0x1, 0x1, 0x0, 0x3ff, 0x7fffffff, 0x10000, 0x5, 0x9, 0x30000000, 0x4, 0x200, 0x4, 0x5, 0x1, 0x4, 0x0, 0xfffff800, 0x10001, 0x400, 0x87c, 0x5, 0x3, 0x80, 0x3ff, 0xd25, 0x1, 0x0, 0x44, 0x40, 0x7, 0x0, 0x7, 0x7, 0x800, 0x7f2, 0x700000, 0x83a5, 0x4603, 0x1, 0x1, 0x6, 0x1, 0x80, 0x1, 0x7, 0x81, 0xce, 0x1ff, 0x40, 0x7, 0x40, 0x4, 0x66d, 0x8, 0x1, 0x0, 0x1, 0xffff, 0x800, 0x1, 0x6, 0x8001, 0x9, 0x2a42, 0x5, 0x2, 0x0, 0x8001, 0x7fffffff, 0x1c, 0x9, 0x7, 0x20, 0x3f, 0x7fff, 0x5, 0x9, 0x3, 0x4, 0x3, 0x4, 0x1, 0xffffff01, 0x5, 0x0, 0xfffffffd, 0x3bb4, 0x0, 0x8, 0x77c6, 0x3f, 0x4, 0x0, 0x7fff, 0x80, 0x2, 0x0, 0x4, 0x0, 0x9, 0x4, 0x2, 0xffff, 0x1, 0xfd, 0x6, 0x79, 0x4, 0x6, 0xfffffffc, 0x400, 0x100, 0x8, 0x9, 0x8, 0x7, 0x3ff, 0x5924, 0xffffffff, 0x1000, 0x49a, 0x80, 0x9, 0x2, 0x829, 0x2a6, 0x8, 0xd5, 0x3, 0x7, 0x1ff, 0x5, 0x7fffffff, 0xfffff28e, 0x5, 0x5, 0x400, 0x1, 0x3, 0x3, 0x7af, 0x1, 0x1, 0x8, 0x3, 0x766, 0x37c, 0x71a54896, 0x8, 0x10000, 0x1, 0x9, 0x6, 0x4, 0x1, 0x3, 0x1, 0x8, 0xea1d, 0x6, 0x8000, 0x0, 0x8001, 0x7f, 0x2, 0x2, 0x8, 0x2, 0x8, 0x80000000, 0x76, 0x33d00000, 0x80, 0x8, 0x2, 0x8, 0x7fff, 0x3, 0x200, 0x800, 0x5, 0xab5, 0x800, 0x5, 0x6d, 0x9, 0x6, 0x7, 0xfffffffc, 0x101, 0x401, 0x4, 0x0, 0x4c, 0x8afa, 0x5, 0x991, 0x101, 0x90000000, 0x0, 0x2, 0xfca, 0x9, 0xd, 0x7b, 0x8bf5, 0xff, 0x2, 0x47d2, 0x5, 0xfff, 0x6, 0x2, 0x3, 0x2, 0x7, 0x20, 0x0, 0x9, 0x6, 0x0, 0xffffffff, 0x80000001, 0xffffffff, 0x24000000, 0x2, 0x800, 0x3, 0x7ff, 0x4, 0x800, 0x1, 0x9, 0x6, 0x200, 0x9, 0x9, 0xa4de, 0x7, 0x400, 0x1, 0x81, 0x200, 0x1ff, 0x101, 0x200, 0x0, 0x3, 0x2b9e, 0x5ec, 0x91e6810, 0xac, 0x8, 0x1, 0x1000, 0x80, 0x3, 0x1, 0xe5, 0x401, 0x4, 0x8a, 0x3, 0x56, 0xffffff00, 0x9, 0x7, 0xfff, 0x9, 0xfffff001, 0x0, 0x7, 0x5, 0x7, 0x1, 0x81, 0x2, 0x400, 0x9, 0x1, 0x8, 0xe2b, 0xfffffff7, 0x5, 0x1000, 0x8000, 0xa3c, 0x6, 0x5, 0x6, 0x10000, 0x4, 0x6, 0x40, 0xd0b, 0xffffff00, 0xfffffffe, 0x7, 0x7f, 0x0, 0x80000000, 0x4, 0x0, 0x8, 0xb6, 0xf22, 0x3, 0x637aeac6, 0x1, 0x4c24518b, 0x2, 0x7, 0x800, 0x5, 0x7, 0x6, 0x14cd, 0xd14a, 0x585, 0x8000, 0x5, 0x9, 0x9, 0x3, 0x10000, 0xd7d, 0x7, 0x7, 0x0, 0x4, 0x5, 0x0, 0x3e, 0x8001, 0x6, 0x9, 0xa74efba, 0x4, 0x9, 0xfffffff7, 0x3, 0xff, 0x7, 0x400, 0x3, 0x8001, 0x6, 0x5, 0x1, 0x507, 0xfffffff9, 0x9, 0x9, 0xf9, 0x0, 0x93, 0x4, 0x7, 0x1, 0x4, 0x6, 0x3, 0x1f, 0x7fff, 0xe, 0x7f, 0x9, 0xa00, 0x81, 0x80000001, 0x6, 0x5, 0x0, 0xa2, 0xb3, 0x3, 0x2, 0xdf, 0x6, 0x43, 0xfffffffb, 0x1, 0x1f, 0x401, 0x7, 0x401, 0x7fffffff, 0x4, 0x8, 0x6, 0x7, 0x4, 0x400, 0x80000000, 0x5, 0x7efdf315, 0x80, 0x96, 0x5, 0x3, 0x6, 0x7, 0x0, 0x7, 0x5, 0x7f, 0xdc, 0x0, 0x0, 0x3, 0x400, 0x1, 0x9, 0x0, 0x8, 0x14a9, 0x568, 0x9, 0x8, 0xff, 0x101, 0x9, 0x0, 0x9, 0xb7c, 0x3, 0x0, 0x0, 0x8, 0x4, 0x1f, 0x0, 0x401, 0x4, 0x3, 0x4, 0x1, 0x5, 0xb776, 0xffff, 0x20, 0x7, 0x80, 0x2f4, 0xfffffff8, 0x23ff, 0x8, 0xff, 0x2, 0x4a, 0x7, 0xffffff47, 0x400, 0xffffff80, 0x9, 0x6, 0x7, 0x3, 0x1, 0x6, 0x5, 0x0, 0x4, 0x5, 0xfffffffc, 0x2, 0x4, 0x5, 0x2, 0x5d21, 0x7ff, 0x2, 0x9, 0x0, 0x7, 0x50a8f142, 0x3, 0x1, 0xc83, 0x9, 0x3, 0x7f, 0x1ff, 0x6, 0x0, 0xd5, 0x1, 0x1f6000, 0xb57a, 0x1, 0x5, 0x1, 0x8, 0x28, 0x200, 0x6, 0x2, 0x25, 0x3, 0x9, 0x9, 0x1, 0x18, 0x2, 0x8000, 0x5, 0x8, 0xffffffff, 0x2, 0x20, 0xffffffff, 0xc155, 0x0, 0x7, 0x6, 0x8, 0x9, 0x4, 0x9, 0xffffffff, 0x95, 0x400, 0x6, 0x101, 0x1000, 0x80, 0x0, 0x5567, 0x0, 0x0, 0x9ff, 0x5, 0x1, 0xffff8001, 0x6, 0xff, 0x3, 0x1, 0x5, 0x1f1d, 0x5]}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x20002, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@dfltgid={'dfltgid', 0x3d, 0xee01}}, {@cache_fscache}, {@cache_fscache}, {@afid={'afid', 0x3d, 0x4662}}], [{@subj_user={'subj_user', 0x3d, '\x00'}}, {@hash}, {@obj_type={'obj_type', 0x3d, '\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@hash}, {@subj_role={'subj_role', 0x3d, '\x00'}}]}}) 08:03:38 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2444.683433] FAULT_INJECTION: forcing a failure. [ 2444.683433] name failslab, interval 1, probability 0, space 0, times 0 [ 2444.685089] CPU: 1 PID: 51922 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2444.685859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2444.686759] Call Trace: [ 2444.687065] dump_stack+0x107/0x167 [ 2444.688202] should_fail.cold+0x5/0xa [ 2444.688668] ? __anon_vma_prepare+0x62/0x500 [ 2444.689187] should_failslab+0x5/0x20 [ 2444.689637] kmem_cache_alloc+0x5b/0x310 [ 2444.690122] __anon_vma_prepare+0x62/0x500 [ 2444.690619] ? __pte_alloc+0x194/0x330 [ 2444.691085] handle_mm_fault+0x2b2d/0x3500 [ 2444.691608] ? __pmd_alloc+0x5e0/0x5e0 [ 2444.692103] __get_user_pages+0x6ec/0x1620 [ 2444.692607] ? follow_page_mask+0x1900/0x1900 [ 2444.693125] ? __lockdep_reset_lock+0x180/0x180 [ 2444.693683] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2444.694228] __get_user_pages_remote+0x1d5/0x870 [ 2444.694791] ? __might_fault+0xd3/0x180 [ 2444.695265] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2444.695914] get_user_pages_remote+0x63/0x90 [ 2444.696446] get_arg_page+0xba/0x200 [ 2444.696896] ? acct_arg_size+0xe0/0xe0 [ 2444.697363] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2444.697924] ? count.constprop.0+0x1b3/0x290 [ 2444.699292] copy_string_kernel+0x1b4/0x450 [ 2444.699813] do_execveat_common+0x525/0x8d0 [ 2444.700339] ? bprm_execve+0x1a60/0x1a60 [ 2444.700834] __x64_sys_execveat+0xed/0x140 [ 2444.701345] do_syscall_64+0x33/0x40 [ 2444.702482] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2444.703095] RIP: 0033:0x7fb8a0961b19 [ 2444.704262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2444.709904] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2444.712231] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2444.714406] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2444.716885] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2444.718967] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2444.721307] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:03:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x41}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x2}, 0x9851, 0x3ff, 0x1f, 0x2, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mount$9p_rdma(&(0x7f0000000400), &(0x7f0000000440)='./file1\x00', &(0x7f0000000480), 0x1821090, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r3 = openat2(r0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000340)={0x84180, 0x21, 0x3}, 0x18) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r4, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$cgroup_type(r4, &(0x7f00000003c0), 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x4, 0x3f, 0x0, 0x80, 0x0, 0x1, 0x69297, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000240), 0x9}, 0x80c, 0x80, 0x7fffffff, 0x8, 0xfff, 0x2, 0x8, 0x0, 0x10000, 0x0, 0x5d0d}, 0xffffffffffffffff, 0x10, r3, 0x1) r5 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000200)={0xa76, 0x0, &(0x7f00000001c0)=[r1, r2, r5]}, 0x3) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x8, 0x0) 08:03:55 executing program 0: ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000000c0)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x400200, 0x130) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x80000001}}, './file0\x00'}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4800000000000000) 08:03:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:03:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 21) 08:03:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat2(r0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)={0x109800, 0x48, 0x1c}, 0x18) clone3(&(0x7f0000000000)={0x20266100, 0x0, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:55 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0x0, 0xb3, 0x1, 0x0, 0x0, 0x53, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x2188932d843139f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:03:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x10000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2461.816113] FAULT_INJECTION: forcing a failure. [ 2461.816113] name failslab, interval 1, probability 0, space 0, times 0 [ 2461.818370] CPU: 1 PID: 52555 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2461.819010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2461.819692] Call Trace: [ 2461.819923] dump_stack+0x107/0x167 [ 2461.820298] should_fail.cold+0x5/0xa [ 2461.821152] ? create_object.isra.0+0x3a/0xa20 [ 2461.821953] should_failslab+0x5/0x20 [ 2461.822803] kmem_cache_alloc+0x5b/0x310 [ 2461.823724] create_object.isra.0+0x3a/0xa20 [ 2461.824725] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2461.825866] kmem_cache_alloc+0x159/0x310 [ 2461.826800] __anon_vma_prepare+0x62/0x500 [ 2461.827736] ? __pte_alloc+0x194/0x330 [ 2461.828693] handle_mm_fault+0x2b2d/0x3500 [ 2461.829880] ? __pmd_alloc+0x5e0/0x5e0 [ 2461.830991] __get_user_pages+0x6ec/0x1620 [ 2461.832226] ? follow_page_mask+0x1900/0x1900 [ 2461.833454] ? __lockdep_reset_lock+0x180/0x180 [ 2461.834767] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2461.836012] __get_user_pages_remote+0x1d5/0x870 [ 2461.837346] ? __might_fault+0xd3/0x180 [ 2461.838439] get_user_pages_remote+0x63/0x90 [ 2461.839616] get_arg_page+0xba/0x200 [ 2461.840675] ? acct_arg_size+0xe0/0xe0 [ 2461.841772] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2461.843067] ? count.constprop.0+0x1b3/0x290 [ 2461.844329] copy_string_kernel+0x1b4/0x450 [ 2461.845548] do_execveat_common+0x525/0x8d0 [ 2461.846737] ? bprm_execve+0x1a60/0x1a60 [ 2461.847917] __x64_sys_execveat+0xed/0x140 [ 2461.849159] do_syscall_64+0x33/0x40 [ 2461.850226] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2461.851659] RIP: 0033:0x7fb8a0961b19 [ 2461.852694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2461.857839] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2461.859904] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2461.861943] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2461.863974] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2461.865976] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2461.867936] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:03:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) clone3(&(0x7f0000000000)={0x201b74000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c00020000008019b1b7030b000000000000"], 0x1c}}, 0x0) sync_file_range(r1, 0x7fffffff, 0x4, 0x1) r2 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x1f, 0xf7, 0x6, 0xb8, 0x0, 0x4, 0x101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x200, 0x6}, 0x800, 0x1, 0x4, 0x3, 0x5, 0x80000000, 0x7, 0x0, 0x5, 0x0, 0xfffffffe0}, r2, 0x7, r0, 0xa) 08:03:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4c00000000000000) 08:03:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 22) 08:03:55 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) dup3(0xffffffffffffffff, r0, 0x80000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000019340)=""/102400, 0x19000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000100)=[0xffffffffffffffff, r1, r1, r2], 0x4) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = epoll_create1(0x80000) pwrite64(r1, &(0x7f0000000180)="5d95c104bc5c67986121abb1753aacee1b6e132024f767b5ca0add43f3e9a3cee2ce10cdff76bfd8b8b53f680205ee233e35c6bc9d3bd0b3557e4933883b53789986e0e069267ad5ba25ad328286ac06f09e6e2164b9ed6df61ee4a4896689bed423e73c27463cc9d47e7f38c08d8ece518a22bdb991124a82fb07dbcf35fd492927c96d85103f71c47ce8f8df6004f28e6cd9f4854e1010b6d05c431fc2916ad1600d3667f7eac240e47da6bb92b5d285bf4a4f191cb54c0643fcee4ec8dfc4d19aee312a78865ecc1a74bd1d3588dccd53e35e669f7914a19ef2a9029029afb9ae6e82e02da35b90ae1e10d42e2d0251", 0xf1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) renameat2(r0, &(0x7f00000000c0)='.\x00', r0, &(0x7f0000000100)='./file1\x00', 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x3}}, './file1\x00'}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000300)={0x2}) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) faccessat2(r3, &(0x7f0000000280)='./file1\x00', 0xd1, 0x1200) 08:03:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x1c000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:03:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2462.229546] FAULT_INJECTION: forcing a failure. [ 2462.229546] name failslab, interval 1, probability 0, space 0, times 0 [ 2462.233108] CPU: 1 PID: 53113 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2462.234896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2462.237056] Call Trace: [ 2462.237754] dump_stack+0x107/0x167 [ 2462.238707] should_fail.cold+0x5/0xa [ 2462.239696] ? create_object.isra.0+0x3a/0xa20 [ 2462.240920] should_failslab+0x5/0x20 [ 2462.241914] kmem_cache_alloc+0x5b/0x310 [ 2462.242968] create_object.isra.0+0x3a/0xa20 [ 2462.244116] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2462.245434] kmem_cache_alloc+0x159/0x310 [ 2462.246477] __anon_vma_prepare+0x62/0x500 [ 2462.247563] ? __pte_alloc+0x194/0x330 [ 2462.248583] handle_mm_fault+0x2b2d/0x3500 [ 2462.249682] ? __pmd_alloc+0x5e0/0x5e0 [ 2462.250705] __get_user_pages+0x6ec/0x1620 [ 2462.251808] ? follow_page_mask+0x1900/0x1900 [ 2462.252980] ? __lockdep_reset_lock+0x180/0x180 [ 2462.254175] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2462.255344] __get_user_pages_remote+0x1d5/0x870 [ 2462.256586] ? __might_fault+0xd3/0x180 [ 2462.257606] get_user_pages_remote+0x63/0x90 [ 2462.258745] get_arg_page+0xba/0x200 [ 2462.259702] ? acct_arg_size+0xe0/0xe0 [ 2462.260714] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2462.261940] ? count.constprop.0+0x1b3/0x290 [ 2462.263046] copy_string_kernel+0x1b4/0x450 [ 2462.264169] do_execveat_common+0x525/0x8d0 [ 2462.265291] ? bprm_execve+0x1a60/0x1a60 [ 2462.266364] __x64_sys_execveat+0xed/0x140 [ 2462.267588] do_syscall_64+0x33/0x40 [ 2462.268567] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2462.269999] RIP: 0033:0x7fb8a0961b19 [ 2462.271013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2462.276049] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2462.278103] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2462.280101] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2462.282065] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2462.284024] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2462.285985] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:03:55 executing program 0: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@l2tp={0x2, 0x0, @local}, &(0x7f0000000140)=0x80) r1 = fork() fcntl$lock(r0, 0x5, &(0x7f0000000180)={0x1, 0x1, 0x6, 0x200, r1}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r2, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_open_dev$ptys(0xc, 0x3, 0x1) fcntl$lock(r3, 0x7, &(0x7f00000001c0)={0x0, 0x0, 0x9, 0x68}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ftruncate(r0, 0x884) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:03:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x3e000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:04:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x200, 0xfffffffffffffffc, 0x3f, 0xffffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket(0x9, 0x4, 0xd7dd) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {r2}}, './file0\x00'}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 23) 08:04:13 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0x7f000000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:04:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6800000000000000) 08:04:13 executing program 3: ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000400)=""/212, 0xd4}, {&(0x7f00000000c0)=""/43, 0x2b}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/244, 0xf4}], 0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r4, 0x0, 0x20d315) 08:04:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000100)={0xdd, 0x7f, 0x3, 0x200, 0xfce, 0xf79}) sendfile(r0, r0, &(0x7f00000000c0)=0xee, 0x4) 08:04:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = fsopen(&(0x7f00000000c0)='ntfs\x00', 0x1) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) getgroups(0x6, &(0x7f0000000140)=[0x0, 0xee01, 0xee00, 0xee01, 0xffffffffffffffff, 0xee01]) statx(r0, &(0x7f0000000180)='./file1\x00', 0x0, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="02000000010002000000000002000400", @ANYRES32=r2, @ANYBLOB="040001000000000008000c00", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000000463308d22e23f56829dceee59fabf267724045e845d0a8943254c70ba0fac9fecfcc4d4487197382161d327dd772ce545ce567841832480127d3bf12c3f4aa439e34fb99ff8a75f2f1728b49cf4ead38f670842abbe35f89304fbaca098d9c93681b3fe530b7cb3f636054076d6f44dfba3941e098d3e8ab1b6e19e9e1d4b8f290585c06be0f0b794461c430056662f29807261476bf66019ce1bcffb60edad7cde677071de7309f97ffd54ccfbc3e25", @ANYRES32=r4, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="10000200000000002000060000000000"], 0x54, 0x3) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2480.229046] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 221 (only 16 groups) 08:04:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = gettid() kcmp(0x0, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r1, r2, 0x18) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) clone3(&(0x7f0000000300)={0x86000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0x3e}, &(0x7f0000000180)=""/168, 0xa8, &(0x7f0000000240)=""/125, &(0x7f00000002c0)=[r1], 0x1, {r3}}, 0x58) 08:04:13 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xe8030000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2480.347324] FAULT_INJECTION: forcing a failure. [ 2480.347324] name failslab, interval 1, probability 0, space 0, times 0 [ 2480.359417] CPU: 0 PID: 54022 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2480.360232] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2480.361203] Call Trace: [ 2480.361533] dump_stack+0x107/0x167 [ 2480.361973] should_fail.cold+0x5/0xa [ 2480.362433] ? create_object.isra.0+0x3a/0xa20 [ 2480.362975] should_failslab+0x5/0x20 [ 2480.363426] kmem_cache_alloc+0x5b/0x310 [ 2480.363916] create_object.isra.0+0x3a/0xa20 [ 2480.364432] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2480.365026] kmem_cache_alloc+0x159/0x310 [ 2480.365525] __anon_vma_prepare+0x270/0x500 [ 2480.366023] ? __pte_alloc+0x194/0x330 [ 2480.366483] handle_mm_fault+0x2b2d/0x3500 [ 2480.366985] ? lock_chain_count+0x20/0x20 [ 2480.367489] ? __pmd_alloc+0x5e0/0x5e0 [ 2480.367961] __get_user_pages+0x6ec/0x1620 [ 2480.368458] ? follow_page_mask+0x1900/0x1900 [ 2480.368994] ? __lockdep_reset_lock+0x180/0x180 [ 2480.369555] __get_user_pages_remote+0x1d5/0x870 [ 2480.370109] ? __might_fault+0xd3/0x180 [ 2480.370591] get_user_pages_remote+0x63/0x90 [ 2480.371112] get_arg_page+0xba/0x200 [ 2480.371556] ? acct_arg_size+0xe0/0xe0 [ 2480.372017] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2480.372579] ? count.constprop.0+0x1b3/0x290 [ 2480.373094] copy_string_kernel+0x1b4/0x450 [ 2480.373562] do_execveat_common+0x525/0x8d0 [ 2480.374086] ? bprm_execve+0x1a60/0x1a60 [ 2480.374585] __x64_sys_execveat+0xed/0x140 [ 2480.375054] do_syscall_64+0x33/0x40 [ 2480.375408] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2480.375881] RIP: 0033:0x7fb8a0961b19 [ 2480.376231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2480.377898] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2480.378594] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2480.379245] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2480.379888] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2480.380570] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2480.381220] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:04:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000140), 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) splice(r0, &(0x7f00000000c0), r1, &(0x7f0000000100)=0x1, 0x1, 0x1) 08:04:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) sendfile(r0, r1, 0x0, 0xfffffffffffffffc) r2 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r2, 0x0, 0x0) preadv(r2, &(0x7f00000017c0)=[{&(0x7f00000001c0)=""/203, 0xcb}, {&(0x7f00000002c0)=""/239, 0xef}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/194, 0xc2}, {&(0x7f00000014c0)=""/210, 0xd2}, {&(0x7f00000015c0)=""/202, 0xca}, {&(0x7f00000016c0)=""/152, 0x98}, {&(0x7f0000001780)=""/58, 0x3a}], 0x8, 0x1ff, 0x5) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) faccessat2(r0, &(0x7f00000000c0)='./file1\x00', 0x160, 0x2300) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6c00000000000000) 08:04:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xf4010000}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:04:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) recvmsg$unix(r0, &(0x7f0000001440)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f00000013c0)=[{&(0x7f0000000180)=""/119, 0x77}, {&(0x7f0000000200)=""/245, 0xf5}, {&(0x7f0000000300)=""/138, 0x8a}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001400)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x12101) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$tty20(0xc, 0x4, 0x0) flock(r3, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="6b0e46eb", @ANYRES16=r5, @ANYBLOB="0004000072000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xd0) r6 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r6, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000014c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$BTRFS_IOC_SEND(r6, 0x40489426, &(0x7f0000001540)={{r7}, 0x4, &(0x7f0000001500)=[0x5, 0x6, 0x2, 0x6], 0x4, 0x2, [0x3, 0x4, 0xfffffffffffff622, 0x400]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r3, 0x0, 0x0, 0x0, {0x1}, 0xaca8b1330354523d, {0x0, r4}}, 0x9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001480)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x2, 0x0, r1, 0x0, r2, 0x2, 0x0, 0x1, {0x0, r4}}, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 24) [ 2480.822775] FAULT_INJECTION: forcing a failure. [ 2480.822775] name failslab, interval 1, probability 0, space 0, times 0 [ 2480.825269] CPU: 0 PID: 54816 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2480.826606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2480.828224] Call Trace: [ 2480.828919] dump_stack+0x107/0x167 [ 2480.829844] should_fail.cold+0x5/0xa [ 2480.830794] ? create_object.isra.0+0x3a/0xa20 [ 2480.831938] should_failslab+0x5/0x20 [ 2480.836349] kmem_cache_alloc+0x5b/0x310 [ 2480.837396] create_object.isra.0+0x3a/0xa20 [ 2480.845475] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2480.846740] kmem_cache_alloc+0x159/0x310 [ 2480.847786] __anon_vma_prepare+0x270/0x500 [ 2480.848895] ? __pte_alloc+0x194/0x330 [ 2480.849893] handle_mm_fault+0x2b2d/0x3500 [ 2480.850977] ? lock_chain_count+0x20/0x20 [ 2480.852016] ? __pmd_alloc+0x5e0/0x5e0 [ 2480.853022] __get_user_pages+0x6ec/0x1620 [ 2480.854084] ? follow_page_mask+0x1900/0x1900 [ 2480.855217] ? __lockdep_reset_lock+0x180/0x180 [ 2480.856410] __get_user_pages_remote+0x1d5/0x870 [ 2480.857603] ? __might_fault+0xd3/0x180 [ 2480.858604] get_user_pages_remote+0x63/0x90 [ 2480.859715] get_arg_page+0xba/0x200 [ 2480.860656] ? acct_arg_size+0xe0/0xe0 [ 2480.861395] ? get_user_arg_ptr.isra.0+0x58/0xc0 [ 2480.862307] ? count.constprop.0+0x1b3/0x290 [ 2480.863187] copy_string_kernel+0x1b4/0x450 [ 2480.864042] do_execveat_common+0x525/0x8d0 [ 2480.865075] ? bprm_execve+0x1a60/0x1a60 [ 2480.866102] __x64_sys_execveat+0xed/0x140 [ 2480.867161] do_syscall_64+0x33/0x40 [ 2480.868098] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2480.869396] RIP: 0033:0x7fb8a0961b19 [ 2480.870342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2480.874913] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2480.876812] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2480.878571] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2480.880336] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2480.882110] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2480.883828] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:04:32 executing program 1: sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4400}, 0xc, &(0x7f0000000100)={&(0x7f0000001e00)={0x20dc, 0x0, 0x300, 0x70bd25, 0x25dfdbff, {{}, {@void, @void, @val={0xc, 0x99, {0x5da, 0x79}}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x1be4, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x230, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_SRC_PORT={0x6, 0x4, 0x800}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x37, 0x8, {0x5, 0x101, "796092a7d93c3428661d54fa02a2e7477aee5b885102b344457f5a905604ce66ab11aed44b43622bfa5878"}}, @NL80211_WOWLAN_TCP_SRC_PORT={0x6, 0x4, 0x6}, @NL80211_WOWLAN_TCP_DST_IPV4={0x8, 0x2, @rand_addr=0x64010100}, @NL80211_WOWLAN_TCP_DST_MAC={0xa}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD={0xbb, 0x6, "cf3ffa3a267193bb9e3e5ccbd98998894dfbf01935835e6b4f61e3aab5e0d4a7a3c971a73465b6122d7aaa750fd1a83686a0c9067c97c58cc68c98377c9c2e3c296ac91b02af334074b7535dacd55230743f5ff493a70ca9069a7e2670fa9f645608b2be672cc8906de781d6c7696d29cec1acc0e663193921bd4c5423157d828e050bedfbae68392d4afe9ab785a11880fb49cf37a6fa4d2301280076b98d1f72b885a0c1408dbb57ae63bc1fe7de00bb32cedbabb208"}, @NL80211_WOWLAN_TCP_DST_MAC={0xa, 0x3, @device_b}, @NL80211_WOWLAN_TCP_WAKE_MASK={0xf5, 0xb, "912d8d79b0ad10087ee3c87e37ecbeb869fc4f316005e75493032593a56d7d90bc070cc7cd836c4cd716eb548b6daf35ffff330500614685c79df1977f193809158487d406374ec72cc531c066f7cbb2be48fba5529c700fbeb733e1847a7dfeade5ff27b022e1c3001615336d807069edd69f1408e8e907afaa6e90b7f0d65ff54603ee16c447fd443c4a1e7c629bbc2f8d322c1d34199db1941777be972e21edfe2d620cd06ff57efa9beea5c5ca4814b2ca5cee8e57f2f5bc4bd81b5a46ee184d9cf95dcf27e25526eb2f332acb04436daaf51b51c2ac74d0144faebaedeff2806a15f0ed47f165d5037e263825771d"}, @NL80211_WOWLAN_TCP_DST_IPV4={0x8, 0x2, @broadcast}, @NL80211_WOWLAN_TCP_SRC_PORT={0x6, 0x4, 0xff}]}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x152c, 0x4, 0x0, 0x1, [{0xd8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}, @NL80211_PKTPAT_PATTERN={0xc9, 0x2, "83df8fbb9b75b8327d18d41d108687ca43ea566edca9d263ee62791ab3afc13fdff2aceff58fbb5bbf7a62e723586d7c55e7de5ce3aa1ff4078b0746b88531b34e66caf6a169f95927834cc6b5612f432040f7f861c16b782603d40e55b1b366d3c1d0b50f4478412ec6f98139b0375340de9e4b8ba9822ca7e86d525ab6a10d5dfd1b8e3bc69a1ed64ba196f756ffc5e7bc7275688a1eb0010b931f3a23828ccd5b3252a033da7096498e3cf04917816e1b080268058df40fa2fa10f594e56285245cc01a"}]}, {0x1360, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x20, 0x2, "de369009150a21a6668022f94de3862776bef787c518d6cfa3e37c40"}, @NL80211_PKTPAT_MASK={0xfe, 0x1, "827c4c32227d00ea03f42d17a091f5fd0801404991232a03c451218fcf154efeb12a8e5552fa5a4afd141eed482d811766eb7f6f53635f82601afeba74ef4ffa37a10fab1476995b7aac30c3ce0b7504c706b7bb42b955ee657c997345fee1605e6e48da69e73146e53bb6c30492904808958afc875410e5a4939015617981e93f0ea8cbfa9803aeddfbf9806db538b5866465e97c410146dff282d7e18aa845acc547536c860116a1fe60def3fc516257cc312d9c6ca22a7e0a40043a4b32aeae1e3369b56748f106b37b128f5d206a5722b8acd69644e4e601f056f882fc27cd21a1fc64f13f7c0819c422517239124f2dbaaa229964feae43"}, @NL80211_PKTPAT_MASK={0x4b, 0x1, "2eed05c0b4c57568adc5558a01e105f0527472097dfb995a31f20c7ab499efc525eb576734c15654cfc8958e39c530a0c15e9f5f69a2a81438ed079f575d1e6e5f57515473d18a"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xb0, 0x1, "ccdcd2665e9f93f1baf8bc75c468c3efa1040751ff580a82c1f0190abe939b644a1b024c3c4acfd67a9f767134ceea43725fbf4640d7a05873952e03378655577e10c41f51ede90b1f93e348100870488c4e25aa070894d90e0fa266b04dc6ad846268b4c20e361c92594f2df2981593a5ff8d5ff2b8a01ef37f632d77e1f6950eea88ec2c4ae39dff08a3ae622f033e2d52385ba6f805dff9425b5c679683c78b1d9e101b211759f585c596"}, @NL80211_PKTPAT_PATTERN={0x95, 0x2, "cd7e0bce9db58f7a818d399b245bbef7eab69ea2824f21f954dc7896720a3b5441e7a05f171f1421e5052a2a4e2db3e964e8dbaa18fbc0a9d768c006d023cb0e85d18dc6ce1c15f62470272416b407d8800fbd00b7d9866113c51fa03ec1b0c009ea07f09490f9bc390607e792c7b3f225962114a70934eb7f6f5cb8ede6625e3af0946acce73c661ee5c5982d6da48d5d"}, @NL80211_PKTPAT_PATTERN={0x1004, 0x2, "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"}, @NL80211_PKTPAT_MASK={0x9c, 0x1, "1a19d4ff104833f8e0f6b67bbe2ce9ce5a81c622bde3eafad453affc5961f63bb10bb6ac7fb650c5512cdb683955717871962d9be8d65888ba1e6f0e49371f5c7e94edba5c83fa57438ac6a089e8407dc9dd7c0f9c64835d8ba89763ccfe9bd652297fceeee339c8537e01e92b41565212d4932bac9561d10e019e328d72df505d94ac8f51972d62e5dce5c3018dd92bbe15b4c2461de1af"}]}, {0xf0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x5}, @NL80211_PKTPAT_PATTERN={0xd4, 0x2, "5378b0a61c4646f312a53457fc66f742a4f5c9770b114bad8c3101022d3ac33ff68e53e54b1833bb0d5acd8db1abb8c9121170b77a2cf48d8d48caea17e06db6f958c495077a77ba259c676e35f0b5d1eb62df0337acddf9066dfc83331d3575fb9ecccae69702b38774a5364606999b0d9913497987ad24fcb16794f063122e470c1c17fce822ca4d72373babad15103de054c44abb7bafd5c28ab126cf226b4678c0d9734ffe852806e6b99d55887740550a1286900d4de228f03d600d2e3a1650e88b22618bbc3560f0e01cf2c23d"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xc279}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x4}]}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x484, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_SUPP_RATES={0x3f8, 0x7d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x95, 0x0, "612f00b85bf0b043b58dee73a727c71b3a2ad44cbab4e8b9a3cef55fddf6896357ebad2ecf3b26de894140894fe793275853c1812fe27b4aa9d25f3e537e2925d4ffcd6ec7d412c9e17e793ae69a7518e51f1940633ab91eb64481815e7ccbd995c263303b1115a07dcb0a2f644a86a5153f0821cef018c450cc69ce5323dea2a6b883103e2f3fd02532f21b36386e14bc"}, @NL80211_BAND_2GHZ={0x9f, 0x0, "637d16d57c8cbd8932e1268e1bb1b32ca3439c9e54ff37f0e377fa8cfcd50786417b817c8a26f96316718e69d284394e19b27d4c3ff2ff82f4e0e012d46fa00cda383461dd376fb2dfc7d36d4168b51741a56e1e9ea69ee4ab7e9c33d25d251f814e801a08f354903bb55d13c46a64bcdbc73b73b67c9ef0450e2b0c7cc8f75434a1413585d6742663f28d54541aa9972282f74cf6480937e0b569"}, @NL80211_BAND_2GHZ={0x8c, 0x0, "b09842debbdc597377b5e76d10817aa8ad8faf4501540b0351921482300df2f378b1d029ec2aa5dc45d949d07cdf3355ece414d4f90e22e720dcb576d570681207740daf242ec191b661ec9452d0f246fe140b605ca7092abbda73916a0bbdf17bddfc052ca7efe941b05c5d4ecb6bb243ebcdced4515290ad58e1b4b818226193f86d8ab7df3a27"}, @NL80211_BAND_60GHZ={0xd5, 0x2, "8ab95eb0f67828f3c44aae7441f1472a6f94204c1959d80549fc7b8e040e86d735fc3e4b62a8e95487aec7ea9ebab4a0f0c2efbb7f5c7efa622f67f94c0894e7d6455170eb6081b32d048ab3e23cca501e5a314fb2b40c87b076d51c78eea5b835b541cf7c4bd6bf0048c47e498ab50b89b3144535b186820f627c5a2afc8983429784497c4d37d73638f24f66f0a7f2f171919d6bc44d06e66d32514b7073e151a78067257851b446e0071a2604846599d624e243f2ca827179d2cd0b85b1fb4ff15447fd5c96b8551ae477e21c77cd1b"}, @NL80211_BAND_60GHZ={0xe2, 0x2, "85cddd2989483b657cd49f6ff518e2a0a1bfd5085af0bf9708e921f7c46c2b4aa02ae75310881dc5cdb99f2c9d28d2d43d8450669977c2838296db86c87e4a9b07966a033184802086fb94c712674f91471a05ca4b94058e213ab21313c7ef66738668d556064f6ee043335e8d0f7e936ededa2af3f5210f1b2852c7cefb125ae5c99f92f3866775196ad1d77e8ea5b38e7b9157e8f1e88fb1936deaa3adb4bb889ec81b32c0b240cc4d2e2233e3db4f6b2d8dffb02d8722a80490189f5270a2c812eb950614d05564ceb8ac0553e7623e4bf5983ece1468c715f2e9b6ec"}, @NL80211_BAND_6GHZ={0x71, 0x3, "5b6e41ad1b871ccd70d98bfc026327e2930e65028384ff8a9725b939ef2bcdd0cbe5f39df276c82bc8a454b3e9881f703e0b794857704d51401f040d467d05ae522b6d9fcb5ed6050c99663a6d874bc309865d8e2de0c0133a4c4d0096ce3ab1522dca9376c894ef9128daf2a5"}]}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_SCAN_FREQUENCIES={0x44, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x7fffffff}, {0x8, 0x0, 0x7fffffff}, {0x8, 0x0, 0xfffff801}, {0x8, 0x0, 0x1}, {0x8, 0x0, 0xcef}, {0x8, 0x0, 0x2}, {0x8, 0x0, 0xffffff6c}, {0x8, 0x0, 0x80000000}]}, @NL80211_ATTR_SCAN_SSIDS={0x38, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}, {0x5, 0x0, @random="8f"}, {0x20, 0x0, @random="9b95864bb8c26ff9ee560104ffd423cfcc9c9f7742df2174be00075f"}]}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x241f}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x4d8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xe0, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD={0x65, 0x6, "02225f0e0b65df820d9098e8451b084807e45d906f271d1d36bc8de68e630865968cf15a9957bb71bcae7e5a99fff1b476b870b85326851fd557b0d339a182b849ff64e9ace65a19cf8e3859dd1f34071197e30555b1b3b2946ea598ae12e1f341"}, @NL80211_WOWLAN_TCP_SRC_PORT={0x6, 0x4, 0x820f}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x1ec5810d, 0x4, 0x9}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD={0x5b, 0x6, "4449d3cf8c212f6f75559eec04e21dfc08a7e109e189755b4f8109e22c9b8a33aa985405548d7a749d85406aafc6015541b3618599f977c0e4803bb20a8eab0cbbb90a5b559664eecbf92022d1b48cc6887c6dc7dd974b"}]}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x3b8, 0x4, 0x0, 0x1, [{0x2c8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x9}, @NL80211_PKTPAT_MASK={0xfe, 0x1, "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"}, @NL80211_PKTPAT_MASK={0x89, 0x1, "57fdb06979e0c368007bb880d233c4b44706220083bf6796fbebbc577fd74f945ea8b42367d11fb0487204ab2f44d739a86f9a56f23ffb3466112985afb44e70c819ed02e6c7a00026b29eb4c4c74e4ea9632e91a8ac444bc7b1633b9bf7b87215f1e207cb2c56d77dbf1dd6d7e626b1af8b5b40fa4e41b83b256e9afb17dcd43589f03e47"}, @NL80211_PKTPAT_MASK={0x66, 0x1, "947fcd6145e1fc48072438dbdbe391e6c0adcc486ad6405af27f1fcf33ef04003f1da1e85441a5a7f43486cf63bddb0922928b11a6de7ebbbc0ab8c75d5c95f24062b57178de6c4eee421ad85d622b83eb9b38ba20adf15ae70b6607b6969604941c"}, @NL80211_PKTPAT_MASK={0xc8, 0x1, "600d642c63c518bcebd70e6ece7d4e4eb7041e0f1c887b49ff191bb3e9c6c1ac766bce2277c98514b2f7931745f0f910b1ac907b20a1574052bc6ea249b4817a69b02d599c1e10509cf6e569d550022987c651d021141f0ab5cb4533e5753508d7a6f3d0a4f9e2d700c02bc2bd6867af884685babbb4eea1fda18dc7fd5087bc1fa030bc056c30010bac0c8ec12936b1fe9bb77273bf4c1722e10c25965324ba96cd379d8f805eacd220687502b886e51894b81969f1e85d42161cbfda3fd2a6a6c5490c"}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xffffffff}, @NL80211_PKTPAT_PATTERN={0x1c, 0x2, "99d034a93d826fa49bfd51ae645715ceed31defd08916a01"}]}, {0xc4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0xc0, 0x2, "0f9691f38a1f9d6fc6d25df79371755fb1a488f753987edcb362d43a9766093cfbe62a78d5aba4d3c87ca36860160306536802fdad8d98224a0c0ffb05812a0d34de636c641f73195341981343d8bf4e2985093370e28d6c1168777f7202bb4459d4f76c7c13ed4a85451586bdb0cc2fcb8ae2259f81b76a5bd11fb263a93384df0ac48b673347ae1bb6a7714621d5f12126a605ab23f0c0e0047870db304f84453630c48da33d96ecd984e9d2c7d7307cedb04026a05e6d37c4421f"}]}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x2c, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x1}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x8}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x3}, @NL80211_ATTR_BSSID={0xa, 0xf5, @random="5a646f3075a5"}]}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}]}]}, 0x20dc}, 0x1, 0x0, 0x0, 0x4000}, 0x220088d0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1, 0x4d, 0x7, 0x7f, 0x0, 0x8, 0x40800, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x10000, 0x2, 0x7, 0x2, 0x101, 0x1, 0x2, 0x0, 0xfba, 0x0, 0x5}, 0xffffffffffffffff, 0x9, r1, 0xe) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:32 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xfdffffff}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:04:32 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 25) 08:04:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7400000000000000) 08:04:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(r0, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)={0x620080, 0x41}, 0x18) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) sendfile(r2, r3, 0x0, 0xb6d8) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000000c0)={0x3, 0x9, 0x5, 0x1, 0x8850, 0x101}) 08:04:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) copy_file_range(r0, &(0x7f00000000c0)=0x6, r1, &(0x7f0000000100)=0x6f, 0x8, 0x0) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f00000000c0), 0x100) 08:04:32 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r1, 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000300)=""/231) openat(r1, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r2, 0x0, 0x20d315) [ 2499.381660] FAULT_INJECTION: forcing a failure. [ 2499.381660] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2499.383234] CPU: 0 PID: 55080 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2499.383887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2499.384681] Call Trace: [ 2499.384948] dump_stack+0x107/0x167 [ 2499.385297] should_fail.cold+0x5/0xa [ 2499.385662] __alloc_pages_nodemask+0x182/0x600 [ 2499.386096] ? lock_downgrade+0x6d0/0x6d0 [ 2499.386487] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2499.387059] ? kmem_cache_free+0xa7/0x2d0 [ 2499.387447] alloc_pages_current+0x187/0x280 [ 2499.387863] __get_free_pages+0xc/0xa0 [ 2499.388229] ? kmem_cache_free+0x249/0x2d0 [ 2499.388639] tlb_remove_table+0x3ca/0xcb0 [ 2499.389050] ___pte_free_tlb+0x86/0xb0 [ 2499.389430] free_pgd_range+0x747/0x1380 [ 2499.389838] free_pgtables+0x230/0x2f0 [ 2499.390215] exit_mmap+0x28e/0x4f0 [ 2499.390560] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 2499.391063] ? strnlen_user+0x231/0x2f0 [ 2499.391444] ? __might_fault+0x144/0x180 [ 2499.391854] mmput+0xca/0x340 [ 2499.392172] free_bprm+0x65/0x2e0 [ 2499.392508] do_execveat_common+0x2e1/0x8d0 [ 2499.392959] ? bprm_execve+0x1a60/0x1a60 [ 2499.393353] __x64_sys_execveat+0xed/0x140 [ 2499.393759] do_syscall_64+0x33/0x40 [ 2499.394125] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2499.394608] RIP: 0033:0x7fb8a0961b19 [ 2499.394963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2499.396665] RSP: 002b:00007fb89ded7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2499.397326] RAX: ffffffffffffffda RBX: 00007fb8a0a74f60 RCX: 00007fb8a0961b19 [ 2499.398004] RDX: 0000000000000000 RSI: 0000000020019300 RDI: ffffffffffffffff [ 2499.398664] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2499.399338] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2499.400115] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:04:33 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r3, 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000300)=""/231) openat(r3, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r2, 0x0, r1, 0x0, 0x10001, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(r0, 0x37, 0x2085, 0x7) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r1, r4, 0x0, 0x20d315) 08:04:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)="e4e9ddc2135e6235383ae3e60f544308174a5786b442cd44335a67372288dda80c88a580eaa88a339635ca42d60702c65abb45bfcadcb118a6c34141c65198493c457bcdffd3ea0ab2c3c7ac04bcdc191bd065ba1a95ca803addc1f2fd0e", 0x5e}, {&(0x7f0000000140)="8cf864a5be59df5f6c78a096cd3aeb1482795ce10b33a4e280f68761c466a1f068dcd58589fedcefa8e511d4c0a872714193d99c2997b0a730130a6d5afe617c0b1b377938eb16d60cea31d5814bf286e9b1b95f693b6f8ce81c905d6126fae37358939e6065e543bd373f50adf4c939c7ddf698e84292308e161a2b320b7a9262b0", 0x82}, {&(0x7f0000000200)="0bc997148b541a", 0x7}], 0x3, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x24008000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) fallocate(r0, 0x64, 0x3, 0x2) 08:04:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x521041, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = signalfd4(r0, &(0x7f00000000c0)={[0xffffffff]}, 0x8, 0x80000) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002680)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r1, 0x0, &(0x7f0000002640)={&(0x7f0000000100)=@nfc_llcp, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/74, 0x4a}, {&(0x7f0000000200)=""/29, 0x1d}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/19, 0x13}, {&(0x7f0000001280)=""/95, 0x5f}, {&(0x7f0000001300)=""/104, 0x68}, {&(0x7f0000001380)=""/51, 0x33}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/208, 0xd0}], 0x9, &(0x7f0000002580)=""/147, 0x93}, 0x0, 0x120, 0x1, {0x0, r2}}, 0xc799) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000039c0), 0x4000, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r6, 0x0, 0x6, 0x0) r7 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r7, 0x0, 0x0) r8 = open(&(0x7f0000003e40)='./file1\x00', 0x8002, 0x1) io_submit(0x0, 0x8, &(0x7f0000003ec0)=[&(0x7f00000027c0)={0x0, 0x0, 0x0, 0x2, 0x4d, r1, &(0x7f00000026c0)="a120449c905af3a3812b4d5381f0d7da35501e48f58e650620da4069a2a81f02a2cc5c36a89e12b624d3e484ec7063258144c440c1adfec68325172623ba1579b3629dcc480db6de247c6b98155f22013c2dd1ab796ade9452af4fb9770d24d90da3e3eae1b749bc33c70092821921611fd1635c6045172202780a7d21c2377954046e14f4d1cf23b542da55646fea8696322a47dc9717ef4bb429e447389c3e4c9ca262685592cf1d839f4a8239d43902a21f9fe974e195e01d41719eb50f000e52e5496e87fdf69f263801466e324adfbf625f", 0xd4, 0x902, 0x0, 0x0, r3}, &(0x7f0000003800)={0x0, 0x0, 0x0, 0x0, 0x4, r1, &(0x7f0000002800)="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", 0x1000, 0x5}, &(0x7f00000038c0)={0x0, 0x0, 0x0, 0x3, 0x1000, r4, &(0x7f0000003840)="3caf1f3d50c16c1c8d05f637263a9d7de2290970fbefe31bc94450f87366840700610a5c7fbfa132f5c815538d73818c0af85b9691f8bbc58a7f88db3caa1a45db14cf37726df90759c8785933713a63fb2af595356103853f0a01b2238589fe8f31141fb3ca65", 0x67, 0x800, 0x0, 0x1, r0}, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x6, 0x2, 0xffffffffffffffff, &(0x7f0000003900)="f9643c237f1f443fbfbe0909ff959c3e3c7ea01e60f7f9a452164371707bd3dae906f7d1b80fcce558c3cb209561e49f48574c92e3c58e97d486b9478d345b1d7d29710758775fe21b8468c4cfb31a539211bd0025020a0f302fd36b", 0x5c, 0x3f, 0x0, 0x1, r1}, &(0x7f0000003ac0)={0x0, 0x0, 0x0, 0x0, 0x7, r5, &(0x7f0000003a00)="37643c81c3ec3c629f212f3aed466a703d6dcb12bad8ed6bc320cee36f979e265350a1353bc6f01fc36afd70a32e2cd7e379d3346e374b650ef6c0d1e9294b39aa9f50cde4eb54226812e69f65e4319c3cbf6c41b1329c0310d46d6c18ea954db8140d9268376fdbfeae3bc939433d2e67479818839290580e7393fa7daf95e7eed79319f51a4ce9dfb71ba2d347db279c05bd5404454f6b30365753c7f8df2ccf951da1e3d2e1518a7552", 0xab, 0x8, 0x0, 0x0, r0}, &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, 0x8, r0, &(0x7f0000003b00)="2cd8f7a3722cf7ee3cc225f54a462c8397f3c430af5f8ec85b826b3a0f6808112da78456570e0d60834759784f43743bec145493d25784ebdaa5fb55e3b0a44ad5639549ff55aff4284877fc80989806d5361ac6ca03b20b3c64cdecc2d7f275dc74b941fa8c06eff5624fd912d43dc34a9a10759142a946ef247bf0764b9e88142d3310935645d83ea1d776088269374c7283e18f4900fbe08cb8dfa7353a9d641a30ec2bba1c", 0xa7, 0x3, 0x0, 0x0, r1}, &(0x7f0000003d00)={0x0, 0x0, 0x0, 0x7, 0x5, r6, &(0x7f0000003c00)="d43f4f0a84c59d85a580121fd58f7f159fe0e9e07c035fe7bde3cc146bfef1aabd2df490134adecd7879acdeed76d3a1c77c72b72c88627d57abe708a7f0cbbd96c9ceeef8673c93a9d47c32d7dd3c71840189ea2d104316ed95da536a89b3c725c0924239646277eb42b757696f9f553a525e6a1ccaa7d9f519c264af8fce822d7d86a0164ae6ff4299eb2e9cdc024d580a502ca081f3e825bb16064187394fba8090058f7b01b8008e8dd6178e45c28a41d7905a52655e39abd5c2ae53c7b31fdf500ac72543aa1e55bb9505b884af3f55a6c00c825e269509ca099fe06ca39bc5099edb", 0xe5, 0x9, 0x0, 0x2, r1}, &(0x7f0000003e80)={0x0, 0x0, 0x0, 0x1, 0x1, r7, &(0x7f0000003d40)="7fa59ac69d288a4098f0011ab39a5713732618cd2c3967e5b48a609f16f03ded0daa873dad354ff40edaafa514e5f5de053b8745dca5f80a3141e076655e8286658e515b0150e26352607a2b340d167767feaa29897bf81fb71e512cfceeefcf4da5bf386481431f785fd580e7c67684b02d8dc94d1d7b41593757fe2adfeb73bf7e4078c6747113f917587a8409384da02942562e6f014b6836526c65abd16fab19e2efb20de8abe1074a2fc22088951a62f46a1ced98ca0b4516a4f4cb2762b3804b5e47405174a9884d3398f53d1d570a004938faee58cb98593f2bb5f36e4284eef34e21befd25f3337127bd28", 0xef, 0x3, 0x0, 0x0, r8}]) 08:04:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7a00000000000000) 08:04:51 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x103400, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(0xffffffffffffffff, 0x0, 0x2d) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x2188932d843071f3, 0x0, 0x1, 0x0, 0x4, 0x0, 0x400}, 0xffffffffffffffff, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:04:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:04:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) (fail_nth: 26) 08:04:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r2, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r2, 0x4004f506, &(0x7f00000000c0)) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x2000) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0xffffff7f00000000) 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$inet6(r0, 0x0, &(0x7f0000000100)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000140)={0x0, r1, 0x10000, 0x20, 0x9, 0x2}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:51 executing program 1: read(0xffffffffffffffff, &(0x7f0000019340)=""/102400, 0x19000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'vlan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000004384669231b4d440e5ff00000000030000003720b281ed", @ANYRES32=r3, @ANYBLOB="e1f01fe0aa8964400000003aa5812cf39fe28003b1c0de247a572fab0300"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r3, 0x2f, 0x3, 0x80, 0x0, 0x1, @dev={0xfe, 0x80, '\x00', 0x41}, @empty, 0x7, 0x1, 0xffffffff, 0x615a}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) io_uring_enter(0xffffffffffffffff, 0x6ccf, 0x49d9, 0x1, &(0x7f0000000180)={[0x3]}, 0x8) r4 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r4, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x4001, 0x102) sendmsg$nl_generic(r5, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)={0x49c, 0x18, 0x100, 0x70bd27, 0x25dfdbfe, {0xf}, [@generic="4f673d325ce3907f034e2cb8ab6d26e6bd13eca4e833c225e30fa391e18eab5a46398afc71e44cdb5de2ecbb1fb6d9e650806e760ea0adba3002b639f5213790b8d5753ab341792ac192dbb84e8d23821901d91ffa5753c10e95f1c0044433e3f60ef04f99ce7f09c2aac68ff2787758e00558a4b40cb8b92eac51c8327a69b7e2393bd42317027cff08c06f64b2f37ad057df72d0d965c69e0fdcd3bba7c518b6", @generic="dd3aa6826f8b8faeb6e3e43c59adc0431c63347b7eb7541352f4d10b042a1a8cdc28613afb9fef7981be2290fcb30cc0fa469bfe4c41c3da6355e6bd4e689bf32596c020b7abb61ae026d589ac40770158add9dc515e824f3e1eef71f4b5ccdaed0a1ed9e0e405d967553c32f516fcbbcaa8705468f2999baa61cadd4728b802af21a6fe86d71c50fa0255de5109", @typed={0x8, 0x4, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="07291c8de46b3820cad8a7a4ddfabc6acc91c2e2c59e686c826f7db3528e8b9168e99db27e347ba37fcb7e54f92a41c9c6012bf84669ef56eb5846ea2e5c", @nested={0x310, 0x16, 0x0, 0x1, [@generic="9b0493828caad40ca068116730042390bc3b956eadba5e090a20302a9788ad6e87c481e4d3ff186ef80843002811834802c253947dc827a2994eb1ba843f6526090ac361cadd05f38c3fc8806c4952bded4e659a75a98149755d", @generic="8a24521e19a4480723bd2716e56d3bff07f49726883099e8edb6c1ad83691f6617634c5ad01f45bdb31a9ac828bb497505ab772641d86dbe2c6e59b4a84d212a252cafa2e3973025c738caa439dfaf4ec137bf5d7b2fe7e901587decef6ffa981d756d4573573cd39ca67b5fca6bf5229e94045a58abf20ab268d7f3787ff6b142519f449461c2f51f6d201444e3eb0831ed87cba6db37e6e56080a0e87c78b5e0fdf6981277ece4957462c901cb9f40f57ba8d3c5c6255d45f862302382124150ff7ae47d4a2b60", @typed={0x4, 0x37}, @typed={0xc, 0x0, 0x0, 0x0, @str='&!-\\#&[\x00'}, @generic="1f5fdf192b23b3ed74764964280f8e", @typed={0xde, 0xc, 0x0, 0x0, @binary="a10b523f1afc432458cca207e8eefc3fab92b887933af2f38cae95ccbf343734d8bc58246e5536fff112258e1a319890c44071f6b5bd1e4bc26fc39a42e640a85fa02de61f264f1ae59839cd8e6a383f766d5de424c7730b808b1e543c42ac03fcb892c082f1dd683d75aec09d8ca55dc9a2d0bfa8afb4f27246431a38df451a7075f395ed99b9402c0a87371366388d377a86bce3b943c2a3036410f30d239d9d7f56e636d761bf535077a3c0e2c7118a2412e8207aadd26ef897cfd8b7f1d6a840ee6c4bbabd66ecf9428ab16c7428f4bddd985137afb81fd6"}, @typed={0x8, 0x5f, 0x0, 0x0, @u32=0x8001}, @generic="21f76e40248370d567b9229a2fd5526f493fb9ab8e4ac5ef237a855b30f023d3a94e52672c808c261a203684b0169fd9fa43730cd2a018fc9671f7969d3a2ac01884d891b7a8f4ec4078c003c3b2e10621af81bf40e17069db140ba166a467be440d69e6271be7406dc9d3b57b20f9ecfad67d4a3b2ac06551ab6412ef5c47cc2473dc35879c548f7e4e1c7ecafbfe1172eff2eacddb639456dd7340001810beaa54a2e3aed1789ea83a6f2015beb67927e98154012eb007175ba1e48fb49efd68eb4b08d56c661aabfb6aad734a9e0502a3099a63cb4c16035a5ac4f82511ebec24d9"]}]}, 0x49c}, 0x1, 0x0, 0x0, 0x840}, 0x4000840) ioctl$BTRFS_IOC_QGROUP_LIMIT(r4, 0x8030942b, &(0x7f00000001c0)={0x5, {0x18, 0x2692, 0x100000001, 0xff}}) [ 2517.946563] FAULT_INJECTION: forcing a failure. [ 2517.946563] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2517.948093] CPU: 1 PID: 56117 Comm: syz-executor.7 Not tainted 5.10.215 #1 [ 2517.948745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2517.953510] Call Trace: [ 2517.953770] dump_stack+0x107/0x167 [ 2517.954149] should_fail.cold+0x5/0xa [ 2517.954508] _copy_to_user+0x2e/0x180 [ 2517.954867] simple_read_from_buffer+0xcc/0x160 [ 2517.955297] proc_fail_nth_read+0x198/0x230 [ 2517.955697] ? proc_sessionid_read+0x230/0x230 [ 2517.956116] ? security_file_permission+0x24e/0x570 [ 2517.956563] ? perf_trace_initcall_start+0xf1/0x380 [ 2517.957058] ? proc_sessionid_read+0x230/0x230 [ 2517.957474] vfs_read+0x228/0x580 [ 2517.957809] ksys_read+0x12d/0x260 [ 2517.958137] ? vfs_write+0xa70/0xa70 [ 2517.958483] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2517.958956] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2517.959418] do_syscall_64+0x33/0x40 [ 2517.959761] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 2517.960237] RIP: 0033:0x7fb8a091469c [ 2517.960583] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2517.962304] RSP: 002b:00007fb89ded7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2517.963003] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fb8a091469c [ 2517.963653] RDX: 000000000000000f RSI: 00007fb89ded71e0 RDI: 0000000000000006 [ 2517.964296] RBP: 00007fb89ded71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2517.964968] R10: 000000002001a440 R11: 0000000000000246 R12: 0000000000000002 [ 2517.965618] R13: 00007fff79c8b90f R14: 00007fb89ded7300 R15: 0000000000022000 08:04:51 executing program 1: write$P9_RMKDIR(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x49, 0x2, {0x40, 0x3, 0x2}}, 0x14) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:04:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x240000, 0x40) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x20}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:51 executing program 4: pread64(0xffffffffffffffff, &(0x7f00000190c0)=""/143, 0x8f, 0x4) pread64(0xffffffffffffffff, &(0x7f0000019180)=""/48, 0x30, 0x5) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/102393, 0xfffffe29) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) clock_gettime(0x0, &(0x7f0000019200)={0x0, 0x0}) futimesat(r0, &(0x7f00000191c0)='./file1\x00', &(0x7f0000019240)={{r1, r2/1000+10000}, {0x77359400}}) 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2602, 0x0, 0x7}, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:04:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0xffffffff00000000) 08:04:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f00000000c0)={r1}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x2) 08:05:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) get_robust_list(0xffffffffffffffff, &(0x7f0000000340)=0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x8, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x48804}, 0x20000040) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x9) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x3, 0x3f, 0x80, 0x7, 0x0, 0x5, 0xa003, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x5, @perf_config_ext={0xd9, 0x9}, 0x108, 0xffffffffffffff85, 0x6, 0x0, 0x80, 0x4, 0x7ff, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xa, r2, 0x9) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r3, 0x26, &(0x7f0000000600)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r4, 0x26, &(0x7f0000000600)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) openat$incfs(r1, &(0x7f0000000100)='.pending_reads\x00', 0x4400, 0x20) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r5, 0x26, &(0x7f0000000600)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r5, 0x4c00, 0x0) 08:05:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) io_uring_enter(r0, 0x393b, 0xec66, 0x1, &(0x7f00000000c0)={[0x4f2]}, 0x8) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/schedstat\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000016c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r5, 0x0, 0x6, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r6, 0x0, 0x6, 0x0) r7 = creat(&(0x7f0000001900)='./file1\x00', 0x185) r8 = fsmount(r0, 0x0, 0x2) io_submit(0x0, 0xa, &(0x7f0000001ac0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="707b46eaca9b5e93104b7049d82164f66e66b3af6ae33aa8cdc216c6a2b234982be0ee2dc992740bcd1f31d202a71a85765a11189b218b552d56562070a80e41f5a34f7681a74fead29a11a4cd871a6a1c8e28197a0b2582028b206828ef8670b1e3ca4a091658e344b3463e0699231c7561d3ba", 0x74, 0x2, 0x0, 0x3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xc, 0xff, 0xffffffffffffffff, &(0x7f0000000200)="b40a09467b22049cc01166f062fd16906cf818e25056f01d6ce06ee55591b415e008a11fa174b16579313a33a1dbbecfd04fcf2710c0bb6275b7", 0x3a, 0x0, 0x0, 0x1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x3, r1, &(0x7f00000002c0)="440b302efffa7e841eacfafe25c7", 0xe, 0x401, 0x0, 0x3, r2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x2, 0x8, r0, &(0x7f0000000380)="ec23eb08fb6afee866c95b879ad494ef0c105c5872d78445fadc1dc25cf36c34c98396bec5c159fb168ddb80a97d4d59b554a461573ec6f5dcf3520ee4ea6790e89b4df84bbdae398a2432b066c518efb6375c2ea3aa22683e005e54260647d2ec85a1e110cbeacc34f4bf6fb037b86f9762d6a875eb42286d328fb1dbdf15f4fc03", 0x82, 0xffffffffffffffff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x8a3e7b03698991cb, 0xa5, r0, &(0x7f0000000480)="c6158042cec9587ca1715c3c23abbc2017207a24c40ff5e350ccdbcaa5555de292dfd4edc04add37792a1818585e2c94851a0a0158d8c7c500be581b13469652877f3f18ec1af5038865b66f29f63271cb349aa98aefdd113eeeeef4b9af13c619e39e74237f5ea9ae253385892054181c9f1e61aa3c15587b10fb4e8f97f4e048cbc35935b5cd9e11a761733a62ed9040d09d612f1a9ef71adb94129b57b10a4fb085329b46df7025f2bdd43828a2402e9aec855924f7ee1827faa9f7395bba15e8f4b77dadea8b40306f58e604b1377b3301b74c646a4327af3a94b3fb7aeca1bd86b86c00a5a43e373a85637015cd83", 0xf1, 0x82fd80000000000, 0x0, 0x0, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x6, 0x88, r0, &(0x7f00000005c0)="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", 0x1000, 0x0, 0x0, 0x0, r3}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0xd2e, r0, &(0x7f0000001600)="bc88a4e31fc632baa483760929d2a360e59c43b7e94ceb276a133cff4770c243636911cb47d15be0bf813e9c819849aa6c60dc3ae9a500067733c29e4b65257083e35a486f8ecfcd655030f2da4faa25f4eff29036829b6736ad56cbc74f1a7f83997b86415817b1ae8397422e3b527fd2a26e0e3f23ac6b14a3887a23bf774d0cc97de0d71019c48ebb1cfa890e21e6cedb311defb33fd499cf4347f22de839bf03b3083a219991e97cc8adec6dc6cc869797c96687b6406fdc34d33246", 0xbe, 0x7, 0x0, 0x1, r4}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x5, 0x7f, r5, &(0x7f0000001740)="36fa223a6683ba254aad7b946ce6728e2758c6e908d62d63a5ae6a6057fb6753506abd7b14a96ca10d1d688166b03e8e1f26fa6bc1f245ab3790d8ee3ad56508da7d93ab7c2bd7d4ef7601d8af06cda298b2b2f42112adb0682e4e228c40854e5bd9ba9127cbdd", 0x67, 0x1, 0x0, 0x2, r0}, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x3, 0x6, r6, &(0x7f0000001800)="6bc8d7b3570206dffa9c687cdf8dc96b44c27fcadca0c2b1add5ac6044e85c82f1ca914b9fa89b2f2aeca328f1df5a730fc91448ea8acde4c1b1fd76f736f7fb2cf650f9e01b025e80ac58c6f1a0575473533fbc8533d06dccfc3006ff382ee709715421729cdb2d580d59ebc6a283ea46ec94ce8e5c910ae824e064ca11319121018537c341483ccd1e4e1d695b24f65e7d7a35bd4f8b55f07d860deb261f012c268bd689043d6e9d266a3a202602702b2fce8d763d009c2149ac5b38a233ca35", 0xc1, 0x100, 0x0, 0x55aae3184fcea5b5, r7}, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x5, 0x0, r1, &(0x7f0000001980)="2c6b9bbedc42fcb2cbde984695ce227a782d9f71135744820b0d056af93eb565e9095d0065ea6166043a5dce29450cf2f0faf3c14ef9e566e10816c5981ad1b7c4829d888d466134568324fbdd68b0fafc25fe2b3986dfbcef2ef5ddaa7dadef3a60e046fd5059465e07ce27bdd5f11c360905a11fb75d2fa00964fdca084eb6c297c1ffe071ced5457accff7f974114c3c34fc9d2c8ecee0b145166bf0a28415bd62e78bf167aae693416b18d36b3cd26b0bee7ea5f9747a6fe869e48f5ab68d6dfd12ef1414cf12fff64ca9f4afe2c8a", 0xd1, 0xfff, 0x0, 0x0, r8}]) 08:05:10 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x82000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:05:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x2) read(r0, &(0x7f0000019340)=""/102400, 0x19000) recvmsg$unix(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f0000000380)=""/183, 0xb7}, {&(0x7f0000000440)=""/192, 0xc0}, {&(0x7f0000000500)=""/176, 0xb0}, {&(0x7f00000005c0)=""/138, 0x8a}], 0x5, &(0x7f0000000700)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}, 0x20100) sendfile(r2, r0, &(0x7f0000000800)=0x4, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r3, 0xf501, 0x0) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r4 = mq_open(&(0x7f00000000c0)='\x00', 0x80, 0x48, &(0x7f0000000100)={0x3ff, 0x3, 0x5, 0x8}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000840)={0x6, {{0xa, 0x4e22, 0x8, @loopback, 0x8001}}, {{0xa, 0x4e24, 0x5, @empty, 0x1}}}, 0x108) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r0, 0x4000}, {r4, 0x8}, {r0, 0x2ec}], 0x4, &(0x7f0000000180), &(0x7f00000001c0)={[0x2]}, 0x8) 08:05:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000340)=""/216) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000019340)=""/102400, 0x19000) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x1000, 0x9, 0x8, 0x1ff, 0x3, 0x81}, {0x5, 0x1ff, 0xe1b3, 0x9, 0x7, 0xffffffff}], ['\x00', '\x00']}) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r2 = fsmount(r1, 0x0, 0x70) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000300)={&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000240)=""/145, 0x91}) 08:05:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:05:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:05:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40, 0xbb8d70a8a395a0f1) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = fcntl$dupfd(r1, 0x0, r0) execveat(r2, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x3) 08:05:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x30, r0, 0x10000000) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000000c0)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd=r0, 0x0, 0x0, 0x8, 0xa, 0x0, {0x0, r2, r0}}, 0x8) 08:05:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x2) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:05:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, &(0x7f00000000c0)={{r0}, "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"}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x2000, 0x62) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000040)={0x7, 0x7f, 0x2, 0x0, 0x3f, "987bd6f2cee26d8da25cd9416174745de929f7", 0x80, 0x7}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:29 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/wireless\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:05:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4) 08:05:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x2, 0x2, &(0x7f0000001180)=[{&(0x7f0000000140)="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", 0x1000, 0x1000}, {&(0x7f0000001140)="e0b058929632920750fd6a9711601da47484cd1c5d34", 0x16, 0x6}], 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="696f636861727365743d6d6163726f6d616e69616e2c73686f72746e616d653d77696e39352c73686f72746e616d653d6c6f7765722c73686f6d0f6e616d653d6c6f7765722c756e695f786c6174653d302c756e695f786c6174653d302c696f636861727365743d69736f383835392d332c6673757569643d61393037353735352d613765662d063700352d633264342d31616232353262342c00"]) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:29 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x3) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:05:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x81, 0x5, 0x80, 0x2a, 0x400, 0x3, 0x6, 0x3612, 0x162, 0x40, 0xdf, 0x7, 0x7, 0x38, 0x2, 0xffff, 0x2}, [{0x6, 0x3f, 0x9416, 0x8, 0x2, 0x200, 0x0, 0xffffffffffff8000}, {0x60000000, 0x4, 0xeae3, 0xfff, 0xfffffffffffffffa, 0x80000001, 0x6, 0x8000}], "1f3c5dd82fd1ab942801c2b38d41f2cba6ff56e29f79ffb0479ae7dddca227fb464a8ae948e50e8d58865648d67d0342e024ba6b322a59d9b9f4c61087b9696dc67d81e17e4a50d71fab9fe6ef990fb3ece059a818c0b2245e00de4830b58c61266bd323e795207ef0afe3a401275c3eda09742671a71fca4aca7e263db0d7daaede3989bf9d400043bc7150de36b5558f7106a3a7163ef279d6ed32ba39ba404571cf65b8d365f0647ea30bfe207b11760542f5fa48ce1240eca4f2064cbe378a5cd7c5bb332494083cf998fb3e17e0d66c15b720d83f16b6e3bded12bec3120dfa6cbf2dd375a196de70b2854d6d2b9eb212b4905949", ['\x00', '\x00']}, 0x3a7) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) sync_file_range(r1, 0x9, 0xfd4, 0x2) 08:05:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) pread64(r0, &(0x7f0000000100)=""/36, 0x24, 0xd4c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) recvfrom$unix(r1, &(0x7f0000000180)=""/125, 0x7d, 0x2, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e24}, 0x6e) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file1\x00', 0xfffffffffffffffe, 0x6, &(0x7f0000001580)=[{&(0x7f0000000300)="4227fea02d0374b58bd7c63a55ce0fe1b8a76575181efa22db0e0109932cc097025e9214f134d4d846e629cec82a4b8bc0cf2322fec97fd5928252611f658792ea48a9cf49a49427b7ab76a7a1f2340eaa8517c0d047b1c13094b70bfaba4af5c818e6ce2716b0e76c62ef33fb2e83eb135636", 0x73, 0x8}, {&(0x7f0000000380)="bacc5edea6f15bb4b8ba42dab3f6554e962e7962bc75ded51b808c906fb2c32b63f79bb58ec442c549df1f99fc9dfb7ef9bbe8817ac5c5e4f6daa6314d72c65326c191836264ecad9a4f304f928b35cd761a605d470b23fd3151b7142ffc9fdb1d77f97a09e85b", 0x67, 0x10000}, {&(0x7f0000000400)="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", 0x1000, 0x8828}, {&(0x7f0000001400)="b7ac85b19e6cddb9199207857796ba53883341361f7e29d69e9356df1026253b460299cfdf787d2731682fc1e7d2763c875fcb0027835bb31a38bd6f38b032f6ab5297ac99d67bfcaa4b13e7e8ba828cac1e7d03bab91c2d773f04a98a25", 0x5e, 0x100000001}, {&(0x7f0000001480)="24e9918f03fc739746b9bc8c2966e378", 0x10, 0x2}, {&(0x7f00000014c0)="74556b5dbab06c7c748693ce12b64d05990318977455df2ad9f691db7e25048b9f930299ee18e361cd2f654a2da9a4cebdeee573e2ddd789b078aa3c8b0671ebb806f3caf7243b42541708d982b04b2a55d5957d78c486ebce8b149a5718b360d9a91f8faca2c32a1febca6bbb1f9fe1956f5c86809f0f8d908e7271c503f33eee750474fd5fc4ae58358137d12131f27055e230d8b382f097787a48bd4afb25f5089a1cd3693f474649", 0xaa, 0xff}], 0x82050, &(0x7f0000001640)={[{@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x2d, 0x70, 0x38]}}, {@huge_within_size}, {@huge_advise}, {@huge_advise}, {@uid={'uid', 0x3d, 0xee00}}], [{@appraise}, {@appraise_type}, {@euid_eq}, {@audit}]}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) openat(r0, &(0x7f0000000b40)='./file0\x00', 0x400, 0x4) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000a80)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = fsmount(r0, 0x0, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) r2 = getuid() r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x46e2, 0xc0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000b00)=@v3={0x3000000, [{0x9, 0x10000}, {0xde, 0x1f}], r2}, 0x18, 0x3) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000a40)={0x5, 0x1000, 0x2, 0x2, 0x1, "331bb704f8499dc2af5529b3afb78013cee2d0", 0x8001, 0x800}) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$DVD_READ_STRUCT(r3, 0x5390, &(0x7f0000000200)=@bca={0x3, 0xbc, "bef0c6d38485425d4d80061ec40fedc53c4782768a3f7a894eb2a081fbe99d263d03193d2e3df1c5a3faecaef6afa7acc102d485351a641fbda44d3cb472aa36483c5c73755a90e5e28117738c07795d5a5fc394c4897a5ba57789a86e1fe2a8ca85d9fc80f8f58aa4b9c94b2882ed186112dd92a73f31a45d3f5a3c728787db622b6a2908a29a1db0d52b290d34e625ded1c693e996e421bb6de3d53e87c6654d5c02c598591bfcb0a4a5e9ed200f9c209461ba8abc023e7f4709ce"}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x884000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache}, {@aname={'aname', 0x3d, '.],'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '[%\x9f}-\xc3\x87'}}, {@fowner_gt={'fowner>', r2}}]}}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2555.590438] FAT-fs (loop6): Unrecognized mount option "shomname=lower" or missing value 08:05:29 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x8) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:05:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x185000, 0x18d) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000340), 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x230000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000200), &(0x7f0000000080)=@v1={0x1000000, [{0x48, 0x6}]}, 0x10, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000180)={0xd780000, 0x0, &(0x7f0000000140)=[r0]}, 0x1) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0xfffffffd}) sendmsg$NL80211_CMD_FLUSH_PMKSA(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1022010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008802}, 0x20000800) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) unlinkat(r1, &(0x7f00000000c0)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r3) [ 2555.725050] FAT-fs (loop6): Unrecognized mount option "shomname=lower" or missing value 08:05:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x42020000, 0x0, 0x0, 0x0, {0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x50, r0, 0xc7ca1000) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:29 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xa) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:05:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x8) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f00000000c0)) 08:05:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x2000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000}, 0x18000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x32104a700, 0x0, 0x0, 0x0, {0x1000020}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x52003) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x1000000, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_loose}, {@loose}, {@posixacl}], [{@smackfsdef}, {@dont_measure}]}}) 08:05:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x5) 08:05:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x3, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:29 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xe) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:05:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = gettid() kcmp(0x0, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r1, r2, 0x18) recvmmsg$unix(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000180)}}, {{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000240)=""/2, 0x2}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130}}], 0x2, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x91, 0x3, 0x4, 0x6, 0x0, 0xfffffffffffffff9, 0x2, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xbd, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x19058, 0x1, 0x6cb9, 0x4, 0x5, 0x401, 0x0, 0x0, 0x1, 0x0, 0x2}, r2, 0xe, r3, 0x8) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x30000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x9, 0x2}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r2 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff8000/0x6000)=nil, 0x6000, 0x1000004, 0x50011, r3, 0x8000000) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x5, 0x80, 0x9, 0x8f, 0x0, 0xa8ab, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x2, 0x3}, 0x108, 0x7, 0x3, 0x0, 0xc31, 0x3ff, 0x1, 0x0, 0xffff}, r2, 0xc, 0xffffffffffffffff, 0xb) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f00000000c0)) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r1}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_MADVISE={0x19, 0x3, 0x0, 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xf}, 0x7452) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:55 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x1a7100, 0x4e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2000, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x40880, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:05:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6) 08:05:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r1}, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x8000000) r5 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r5}, 0x0) syz_io_uring_submit(r4, r7, &(0x7f0000000140)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index, 0x6, 0x0, 0x0, 0xa, 0x1, {0x2}}, 0x2) r8 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r8}, 0x0) syz_io_uring_submit(r2, r10, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x5}, 0x2c10) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x640, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/26, 0x1a}, {&(0x7f0000000100)=""/160, 0xa0}, {&(0x7f00000001c0)=""/125, 0x7d}, {&(0x7f0000000240)=""/109, 0x6d}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/33, 0x21}], 0x6, 0x6, 0x40) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:05:55 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:05:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x1c) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:05:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x301040, 0x2) 08:05:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a00)={0x0}, &(0x7f0000001a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001a80)=0x0) clone3(&(0x7f0000001b00)={0x20a000800, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0x3c}, &(0x7f0000000180)=""/182, 0xb6, &(0x7f0000000240)=""/103, &(0x7f0000001ac0)=[r2, r1, r3, r1], 0x4, {r0}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:05:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7) 08:05:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0xce1}}, './file1\x00'}) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x3e) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:06:14 executing program 1: readv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/130, 0x82}, {&(0x7f0000000180)=""/117, 0x75}, {&(0x7f0000000200)=""/47, 0x2f}, {&(0x7f0000000240)=""/32, 0x20}, {&(0x7f0000000280)=""/240, 0xf0}, {&(0x7f0000000380)=""/14, 0xe}, {&(0x7f00000003c0)=""/200, 0xc8}], 0x7) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000540)={0x2048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r1 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = gettid() r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) kcmp(r1, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r1, r2, 0x18) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)) fcntl$getflags(r3, 0x407) fsetxattr$security_capability(r4, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x9, 0x3f, 0x6, 0x78, 0x0, 0xfffffffffffffc00, 0x0, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x2, 0x10001, 0x3, 0x3, 0x0, 0x1f, 0xff, 0x0, 0x7fff, 0x0, 0x5}, r1, 0x4, r4, 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0xd60e4889d116052a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000140)) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x1, 0x224003) writev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000280)="6d20cee30767f1086f71042f2252fe293cd7fed2f6184388f15817cbb5c134f11f1d025b4819cb0091db38b6501e1d761f7b08", 0x33}, {&(0x7f00000002c0)="711f58f3fbd2", 0x6}], 0x2) execveat(r2, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x8) 08:06:14 executing program 6: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000100)=""/186) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:14 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x741) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x42a01, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x4e20, @private=0xa010101}}, 0x0, 0x0, 0x4f, 0x0, "5a1ce6bd13d7a7c746c486c286ce897aaeae1c7d4dd9e3b021ac04464937dc69c89fe0422e3772d48d425c480ecea87db706d2be998b95fefff0ee9fdcc53010664b3a098a5f135f8e73ae739fb4121a"}, 0xd8) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x7fe, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(0xffffffffffffffff, r3, 0x0, 0x2) 08:06:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x1f4) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:06:14 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x111040, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x549401, 0x88) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x800, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:06:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) copy_file_range(r0, &(0x7f00000000c0)=0x100, r1, &(0x7f0000000140)=0x80000001, 0xd3c, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) r2 = getpgrp(r1) r3 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = gettid() kcmp(0x0, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r3, r4, 0x18) clone3(&(0x7f0000000300)={0x8080000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0x3f}, &(0x7f00000001c0)=""/141, 0x8d, &(0x7f0000000280), &(0x7f00000002c0)=[r1, r2, r1, r1, r1, r1, r3, r1], 0x8, {r0}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) open(&(0x7f00000000c0)='./file1\x00', 0x401, 0x2) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r5, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r5, {0x1}}, './file1\x00'}) 08:06:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000180)=0x2) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) renameat2(r1, &(0x7f0000000100)='./file1\x00', r2, &(0x7f0000000140)='./file1\x00', 0x1) 08:06:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f00000000c0)={0x7ff, 0x671}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x48) 08:06:14 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000000c0)={0xfffffffc}) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:06:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x300) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) [ 2601.361468] EXT4-fs warning (device sda): ext4_group_extend:1805: can't shrink FS - resize aborted 08:06:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r1, 0x0, 0x0, 0x0, 0x12}, 0x800000) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0x20010, r0, 0x10000000) syz_io_uring_submit(r2, r4, &(0x7f0000000100)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x3, 0x0, @fd_index=0x4, 0xfffffffffffffff9, 0x0, 0x0, 0x8, 0x0, {0x3}}, 0x2) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = timerfd_create(0x6, 0x80800) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x5, 0x2, 0x1, 0xfffffffffffffff9, 0x3, 0x3e, 0x0, 0x2f0, 0x40, 0x3b, 0x5aaf961, 0x400, 0x38, 0x2, 0x3, 0xfff, 0x3}, [{0x70000000, 0x7, 0x9, 0xffffffffffffff81, 0x100000000, 0x7, 0x715, 0xcd}], "7c16b0c014b075e71dd234040b12b458315671299f072a1d46361bea495ae71bc74cca2b5c18ed5b06aabf0dd5ecace95908c3b15635d054326a5b1ddcc836e68934d4491e35a2f137db5553917cfcbcf779ca73e100655b6faedd081ea648a04eace84c385a0fc8debcf2cb1eaa5b277b1d9beb46c86d5de0da16a22a43590ab2f98b636bde7291aebc", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa02) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x2) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:34 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x20d315) 08:06:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000001740)={{0x1, 0x1, 0x18, r0, {0x106, 0x9}}, './file0\x00'}) mknodat$null(r1, &(0x7f0000001780)='./file0\x00', 0xc000, 0x103) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18000, 0xffffffffffff0001, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)=""/92, 0x5c}, {&(0x7f0000000180)=""/105, 0x69}, {&(0x7f0000000200)=""/118, 0x76}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/166, 0xa6}, {&(0x7f0000001340)=""/195, 0xc3}, {&(0x7f0000001440)=""/205, 0xcd}, {&(0x7f0000001540)=""/76, 0x4c}], 0x8, &(0x7f0000001640)=ANY=[@ANYBLOB="1c000000000001000000010000000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c8baa903f35eee46400000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x98}, 0x40002042) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x4000000000000271) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x6, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) 08:06:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4c) 08:06:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) linkat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file1\x00', 0x1000) 08:06:34 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x3e8) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:06:34 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r0, 0x0, 0x6, 0x0) r1 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0xffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="01198d291d455cfbcf7f5f17b315158a698ad95980eb1590d3350d427c2c5b3641845b2f803b779c3476191e0789f774c2b72cdabce1b1c6e104d8ba97236259b53782fba44ec3aae2ef3171f18bffaebaa175668ba4bfb15e8e3aeca66ce2a197925444ddbe", 0x66, 0x6}, {&(0x7f00000001c0)="91405189004c69785c4458a5e60e81967d98fd799efd397e48a33fbbcad85d773127854f7f484f48481a8e106b352108622b41b94d2babad19cd75a53bd07531", 0x40, 0x800000}], 0x1000, &(0x7f0000000240)={[{'\\&'}, {'-.'}, {'k^*\\/]^'}, {'-[[^\x8b'}, {'+^'}, {'\xdd'}, {'%${{'}, {'\x97}\xb3!&&#@'}, {'({'}, {'+{*\xde'}], [{@euid_gt={'euid>', 0xee01}}, {@euid_lt}, {@context={'context', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '{\'$/'}}]}) dup3(r0, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r2, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendfile(r1, r2, &(0x7f00000000c0)=0x8, 0x10001) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0xdf20, 0x5}, 0x820, 0xfffffffffffffffc, 0x0, 0x7, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x754}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000100)=""/197, 0xc5}, {&(0x7f0000000200)=""/125, 0x7d}], 0x2) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x86) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) fsmount(r1, 0x0, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/102361, 0x18fd9) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) syz_io_uring_setup(0x5020, &(0x7f00000000c0)={0x0, 0x72b3, 0x10, 0x2, 0x7b, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)) pread64(r0, &(0x7f00000001c0)=""/36, 0x24, 0x7010) syz_io_uring_complete(r1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) execveat(r1, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) openat2(r0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)={0x4200, 0x141}, 0x18) 08:06:34 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xa00) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:06:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x10000000}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = openat(r1, &(0x7f0000000280)='./file1\x00', 0x1, 0xa0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r4 = syz_io_uring_setup(0x35b5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r4}, 0x0) syz_io_uring_setup(0x4b51, &(0x7f00000002c0)={0x0, 0x9b57, 0x20, 0x0, 0x357, 0x0, r2}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000380)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r7, &(0x7f00000003c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x2029}, 0x0, {0x0, r8}}, 0x7) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {0xc79}}, './file1\x00'}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x1002080, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{}, {@cache_none}, {@cache_loose}, {@dfltuid}, {@access_client}], [{@obj_user={'obj_user', 0x3d, '`-+:*#)'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ')&*-$\x92%^]:!%'}}, {@smackfshat={'smackfshat', 0x3d, '+:$^'}}, {@subj_role={'subj_role', 0x3d, '*[)'}}, {@dont_hash}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}}) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mq_open(&(0x7f0000000000)='^\xde:\x00', 0x40, 0x0, &(0x7f00000000c0)={0x9, 0x8000, 0x7ff, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x68) 08:06:34 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xe00) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:06:35 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:06:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0xffff}, 0x0, 0xfffffffffffffffc, r1, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:53 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x1c00) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:06:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40100, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x28, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='&\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002dbd7000fcdbdf250400000005002e000000000008002c00b0d82d72"], 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x24044000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) ftruncate(r1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:53 executing program 0: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) fcntl$getown(0xffffffffffffffff, 0x9) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000001580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000e8ae000002000000ddffdff8ff86cda8ffff5eb200"]) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000100)={{0x0, 0x20, 0x3, 0x5, 0x3, 0x81, 0x7, 0x7fffffff, 0x9, 0x1fc, 0x2b, 0x800000003ff, 0x100000001, 0x7, 0x10000000005}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/16]) fsmount(0xffffffffffffffff, 0x1, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000052c00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053000)={0x376, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x6, "5c83c9bf8af498"}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)=ANY=[]) r4 = fsmount(0xffffffffffffffff, 0x1, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000052c00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000052e00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053000)={0x376, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5, r6}], 0x6, "5c83c9bf8af498"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000001c0)={0x0, r5, "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", "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"}) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000001540)={0x6, &(0x7f0000001480)=[{0x937, 0xdc, &(0x7f00000011c0)="4b111fa25e34a8cfc923d0d29a1be0a1560e8131f6366d464ad136946f661a9cfc2ced25fcf7bb195aec2fead1d79468a2680e73cd46bd0ee1b2200541604bb96ed813e5b6f2c5912133e43a6af48b9d76f1cd2997a4ccce956e34308278db10b03463f4254585bac6caa8cb4735884c540442b4749201aef3ef494fbd5aecfe9e7c6a3a43f63d2f354974c7a19c3f46979af0b576f0132d1f71f7c62c1d7e29044f14e6a4cec01d918b41f33d3375a6ee92c5ae4d95b8925575bb0de954598317e6b1cf15fa1e715f22a64bba64d0bfb57ad251e2e515707cb69522", 0x1, 0x1}, {0x9, 0xc, &(0x7f00000012c0)="6be5e0ddf8d5bd5099cd42bf", 0x1, 0x1}, {0x1ff, 0x4c, &(0x7f0000001300)="9d8340211deca0859ca320d274657c7fc2713a669c59ca76b84f74e53a31c4d8b9f52947ade5a1c7ae4edb6edf881c70ab6d1194d74d41268d407ff587f3bb35c9b335deb0264693802a4902"}, {0x3f, 0x4, &(0x7f0000001380)="a6467abd", 0x1}, {0x5, 0x27, &(0x7f00000013c0)="f9c7b6a179c3cd807359f12b91d35adc3ffae3eb2850ff46ead29c9eb23affc999cc5c7e900595", 0x1, 0x1}, {0x0, 0x4a, &(0x7f0000001400)="c4c3f77fa12c53bd8bb416676cec939e2701b42abb2d8b36bc7c713cb0ba88d2e73684fb813737156bc341638512724bf2e39af4b0ce70bf67e17a9dd48e9121f84fd997fae951354785", 0x1, 0x1}]}) 08:06:53 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:06:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f00000000c0)="7039551c750cdfc70c85970a8fcabc8f292f70c960d280a2bcef34778260140746155905e68f70f7b2ab815b725bbf822b384901ad4d7bf4556d35440c4af5a3cebf2413bd9e59014d4983238cc0688a92a7133069af16d12219fdf7bbe3e76000f534df4f65c54983e536d62680b883cd57fc23be166a89fe0f7da5bd8b5de4b2023f3d2120c57fa0afb4e7124188b9394cebba34c385f69527d2c94b1c5682a79bca91fca2611c968d5765156926a0ca6f35420ed3c89ac298f162b87ada09b75e7dc514754f84986089b379731d2e2f9d860bc63ca58ee29dd8323f2f6849217e0c2255ef2cfffabaabab6715609fb6dedf29b3ca22c6f399b22d54", 0xfd) 08:06:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x410002, 0x108) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) copy_file_range(r1, &(0x7f00000000c0)=0x9, r2, &(0x7f0000000100)=0x7fffffff, 0xe2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6c) 08:06:53 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x3e00) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:06:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ab) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) write(r1, &(0x7f00000000c0)="c7df9014425c1cebb9921d7a1eb939d4c7a84f2dbe16365ed4eeee2224008da4cd5e9dd7debcfc1b", 0x28) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x8000, 0x20) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x0, 0xc1, 0x4, 0x5, 0x0, 0xe8, 0x181, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x7fffffff, 0x4}, 0x40040, 0x2ff1, 0x6, 0x8, 0x0, 0x2, 0x2, 0x0, 0xc1b5, 0x0, 0x47e9c2b6}, r0, 0x10, r2, 0x5) 08:06:53 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(0xffffffffffffffff, 0x0, r1, 0x0, 0xfd0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:06:53 executing program 6: read(0xffffffffffffffff, &(0x7f0000019340)=""/102400, 0x19000) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0) clone3(&(0x7f00000003c0)={0x8000, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140), {0x3f}, &(0x7f0000000180)=""/223, 0xdf, &(0x7f0000000280)=""/223, &(0x7f0000000380)}, 0x58) fcntl$dupfd(r1, 0x406, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000440), 0x0, 0xc0c0}, 0x4000) 08:06:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x93c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:06:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x74) 08:06:53 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7) 08:07:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7a) 08:07:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000010000001800000080eb8b082b170bcdb7eda437420ccf173725b86508c216017c8eb7edf945029605b9a1b159350dd90c645a66f59dc82d006fdb7f59f5fdff6b44cfc74f3d520b981fdafd3f998a2eed921355d6782d2a5a19a6691d8ba3db2a1ed6b268d4a32612f86b9605f184a515944c03d04dac7ce19def931609a852eafc65ac72de4d04851c9ada5afb887ec175a299a25de788ae0beac1577f18c8ccc553dfce7d58ab0230d023e7d6b26b0f0290a7e117c3fe81b799b618a49f8c2ff24ce1642d4f0f51215869c9a22fdad1bb936ee114d7", @ANYRES32=r0, @ANYBLOB="05000000000000002e2f66696c653100"]) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x205e, 0x400, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1}]}, 0x1c}}, 0x0) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x10000}}, './file1\x00'}) open_tree(r4, &(0x7f0000000240)='./file1\x00', 0x8000) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x2002, 0x141) 08:07:12 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xc4022, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:07:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x420002, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x1, 0x20, 0xdb, 0x5, 0x0, 0x16, 0x40, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xce, 0x1, @perf_config_ext={0x7, 0x9}, 0x4000, 0x8, 0x8, 0x6, 0x5584, 0x5, 0x800, 0x0, 0x0, 0x0, 0x7}, r1, 0xa, r2, 0x8) 08:07:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x7f00) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:07:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000140), 0x1000) r1 = syz_open_dev$sg(&(0x7f00000000c0), 0x101, 0x200042) pwrite64(r1, &(0x7f0000000100)="f29c094574a1e1adaf9f0b905d5fcbb978e3d9e3e94b88de6237", 0x1a, 0x100) sync_file_range(r0, 0x7, 0x5, 0x5) 08:07:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r1}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000000c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x1ff) 08:07:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) openat(r0, &(0x7f0000000180)='./file1\x00', 0x240082, 0x41) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x0) splice(r0, &(0x7f0000000100)=0x1000, r1, &(0x7f0000000140)=0x3ff, 0x5, 0x8) [ 2658.440903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8286 sclass=netlink_route_socket pid=64723 comm=syz-executor.4 08:07:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xe803) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:07:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000340)=0x5, 0x4) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000003c0)=0x1, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000145af1464a320000000180000006b098ae5c69787be4e9eed0ca220888d636f72cf11653a61c2d63015f15363a93d93cdc899c6139f957a0e41835db6c4fd1d66d75f518f0256c4d7338366793f619d7dbbc63513148bbc50b859de4c4abb9ea8476b4e88a69394ac28e0f1879423d2c34848a7971a97fe", @ANYRES32=r0, @ANYBLOB="06000000000000002e2f66696c653100"]) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000033c0), r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000003700)={&(0x7f00000000c0)={0x2c, r4, 0xc21, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BSS_BASIC_RATES={0x4}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c400ca00", @ANYRES16=r4, @ANYBLOB="010029bd7000fcdbdf25060000001800178004000100040002000400030004000300040005001c00e700924c5d25bcfdd6a54adcdd1fe5aadae15621212230a4fea51c00e700cbffec8e2a0137c09a7421bfe7cd2a81f22c175d1a1a694d0a00e80008021100000000000a00e800ffffffffffff00001c0017800400040004000400040004000400040004000300040001000a001800030303030303000008000500040000000a00180003030303030300000a0018000303030303030000"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x4040) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000100)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x620100, 0x0) read(r7, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(r7, &(0x7f00000000c0)='./file1\x00', 0x103282, 0x15) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000300)=[&(0x7f0000000200)='%:\x00m\x86\xdc\xc9\xe5\xec\xb9\x8f`\xa8 \xf0\x8d\x83\x98\x8f\x1b\xebe\x03\xa5\xbbr1\x80C\xd0\xe7oc1\x7fU\xd4qT&\x99\x83\xbe<\x02\xc2o2\x8fYw\xc8\x1bzL-K\xf3\x05F\xe9aFsYKaxs\x94\xd9\x9f\x02\xc8\x9eb\xdc@\xb6\xe3SCm\xf8\xfc\x9dL=\x1c\x89\x83?;*\xb5X\xd5\xd4\xfd\x9b\xe1U\x86\x8a\xf5\x91\\\xe9\b\x1d\xdc\x1b\xc4\xc8\x84\xe9\x10\xb1h%\x01\x19\xb71\xe2\xfb\xbf\xd1+\xc7O\'k\x1b\x15N\xce1Kp<\x85l\xce\x16\xaa\xb9\x92ni@F\xaf\xd4\xcd\x1c^\x91X\xc8\xbc\x97\x8c\xf9\x98[0j\x90\xb3\x18\xcdc\xbe\xc9e\x8e1\n \x9b\x13\x16`\x110S\xc4\x1ax\xcf\xba\xb4\x9ej\xdc~\xfd8\x1a\xb9\x8a\xf2\xcd>g>\x03\x05\xfb\a`\xa3\xef:\xcc', &(0x7f0000000140)='\x00', &(0x7f0000000100)='--[%-\x00\xd9\xc4;\x15\x1ct\x13\xd5J\xb8Q\x80\x12<\xa6\x03\x00\x00\x00p\xbfQQ\xf5T[aB~n\x8c\xd9\xb0', &(0x7f0000000180)='!\x00'], 0x0) 08:07:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 08:07:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x953080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x400) 08:07:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x800, 0x172) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) vmsplice(r0, &(0x7f0000000280)=[{0xfffffffffffffffc}, {&(0x7f00000000c0)="5da15e3aa2ec1ffb99292b940c939d0d24c722c30d8f1256671a1a6ab400ab768eaf8eacb26b5abd166d05631e0c3f04fb04f40a8f40df5c35c2fc63451b7b610b22de6d37bf8d8397876b06cc50e866306be6c83a7ebbef70757e3d9f25057c1e28deac92e5003a29eded0a433111b839613bcdcf42a24ff50cdf66a54c03fad0593cf5b546959392e844c90ea5e2d73e02c110f6a658632119f0ef8c1a5df80cf5fde74f76acaa7af1cc4998e28514327ee4d4895d7a1730c14395e6f08bcdafc4ef9ff88007d0a5528bcbd456fb72a95c58006eefe955102a7bdcc3a7550ba78305bf8e3340af09e235968be41f19a0c61f4b", 0xf4}, {&(0x7f00000001c0)="c05a4a9758a70e9491f9d3dee744254b25b2516321a1df3e16a3a4c9e4e40034fa6d68c43dc72238fd7a555898b475390f2c4bec915c94282a", 0x39}, {&(0x7f0000000200)="88fb2a06d78eb83c5113f9c1912d4f94a4587292cc2d72d533d9c9dfcc32c5bdb2beef1a53ec887187377e089a267bd6df5d00286f69bf400e10d3d9cfa6856524757892688013fd09c716e174ef8ac2a1d2143fe8fe09708386ae74f8e53c63c6da7bdd1c51e0", 0x67}], 0x4, 0x4) 08:07:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) readv(r0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000300)=""/231) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x3, 0x0, @fd_index=0x1, 0x9, 0x0, 0x0, 0x2, 0x1, {0x2}}, 0x9) copy_file_range(r2, 0x0, r1, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r1, r3, 0x0, 0x20d315) 08:07:31 executing program 4: read(0xffffffffffffffff, &(0x7f0000019340)=""/102400, 0x19000) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x20, 0x5e, 0x920, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x6}]}, 0x20}}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x1, 0x3, 0x1, 0x1}) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x448, 0x2d, 0x100, 0x70bd29, 0x25dfdbfd, {0x1e}, [@typed={0x8, 0x91, 0x0, 0x0, @u32=0x8}, @generic="7e7ee355ed1f1e0dfdbae885c559aacaaa59f5e3c17b799fd39a6912929a7b8d788e06a1eb41493f29ecacc56d487fe6b398882006ff5854b37ae4aca4ee307af00b76a9dfc7d1c5c69b9513eef0af586bda7f3e1367db0f10c50f73b01274b4eb15bceef0bae527873991e1562e37aa3e77da32aba8", @typed={0xc, 0x10, 0x0, 0x0, @u64=0x8}, @nested={0x176, 0x5d, 0x0, 0x1, [@generic="16d00cdc3369029ec10776266d5b45b3ac658b6055f3e33510914aa1e31e336e4ab5c78801e771e9164c205cea8b5062eccfb6051729bd54202eaadf3d18bd83e73b710cd01e22ae9a4c98d0ebf899dad4586e254f737e1613fef3f56cbe054d53e681b2e3ea74fa0ac7", @generic="f32a4649b247cde8171003f207801b2d7f71", @generic="2ca0656faa8c099eaa08b43d9ac642ddd42c3c6bffde55ac344b9ec91f514849116f2f396cfb7b54de3051bb8ddf119f79097c2a9a37113f31849b2a04a3f38a7aeef4c2d796a7371ef6cf7cfa971d8ebde7bef315d25cbac861637555d13bc3983445f436c914c18e91d8ceccab81ef2b2365f7df0b426c5eef06c91944e38b91bea2048dd855bb34b7247190378805d6921ec64d27a7995c3a83b2380a0e15cc59beb83c490dbab74ea126a0f59366c0fc8222052a31f07be70c28946f3fad42cf7763d3fe5b1bb927a51a24905ca823498ced4c65096e452b1edba02adc8f35a452734bfaadf2763f38a8910d1167d094831ab40f"]}, @generic="cc28d088eca06e5a75b9d7f6a9d09f0d138a42a8edf6e0b9b4f0312618a06860e6d7f95de854158500d7bf40c417f1958babfe125ce035e035e51422f16beee19e47f3ab7d8e6e05eace32147d84fa1aa9e8f9e1aa99fcf17cbf1c6c91c8c07ad6ef7bde093687918d7ee5ee5444efdb035c732704e2746fe0e38f820a0e788b6655cc88ee84781971c3b7e75b8e69f6d590edc353638469a023ec44abe3108f4b0f769b6db1", @generic="5c9b58acd1ee6ec7f4f8fed0b28045f2cd2a63e9eff8df9d7a283e0f528927cb69ccb96cc160ee0bfe45a04e84cfabaa3e7a1766bc6d58853b61698456b28f8b0e6d8095b387648e4c8f68ef8a9735a95c8bf7935a5e6c17dcc2d9efd17bf403ca5b59060fe39709b8f8878d03ca2bae95e782d5e7e85c91fbc5b4b4be1503684f3ccaf60498013bba2f6783", @generic="9c14d6b23531d6f7e2df9180c53fcaa9da40adb0f4035f1928e7fa3a7965a57e08dcd6b32fab046bf04edf26811008a77e855ec67445065b4018cc500b46a18670e32b1a3af30d0e2d4ca58497331be06b5c386db25bc9056b77f545916aaf12508203e96bf6b86e9ac91b68b247255b00475a0b3a7a600a27699e33822ba4b701e81764ba0f46443f03b8913315a6b60f068eb9", @nested={0x6a, 0x87, 0x0, 0x1, [@typed={0x8, 0x8, 0x0, 0x0, @ipv4=@empty}, @generic="f1885d8400faaece8a2efd8f0d4137fba21cffb633a7c9ba1865bf6e9c625cc1ad42d47fb61643453480fe62aa4382d572f4811e35bbd7411238770648663b5604679d2a0ab1a1a97a020dedeea3e8fd41ab616871be82f615df382c174a"]}]}, 0x448}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000008) 08:07:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x300) 08:07:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x40, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000100)=[0xffffffffffffffff, r0, r1], 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x203040, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_client}], [{@audit}, {@dont_hash}, {@euid_gt={'euid>', r4}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@dont_appraise}, {@uid_lt={'uid<', r5}}]}}) fallocate(r2, 0x0, 0x6, 0x0) copy_file_range(r2, &(0x7f0000000140)=0x5, r0, 0x0, 0x6, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:31 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x100, 0x0) read(r0, &(0x7f0000019340)=""/102387, 0x18ff3) write$binfmt_elf64(r0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x623) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) r3 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r3}, 0x0) syz_io_uring_complete(r4) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r6, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r6, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r6, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[], 0xfdef) accept$inet6(r6, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r7, 0x1000003) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd=r7, 0x99a5, 0x0, 0x7, 0x0, 0x1}, 0x0) r8 = creat(&(0x7f0000000000)='./file1\x00', 0x100) syz_io_uring_submit(0x0, r2, &(0x7f0000000100)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r8, &(0x7f0000000040)={0x20000}, &(0x7f00000000c0)='./file1\x00', 0x18, 0x0, 0x12345}, 0x4) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xf401) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:07:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x80000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:07:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x8100, 0x4) 08:07:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x1000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:07:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x1bc636fccb68a43c, 0x100000001}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x400000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x2}, 0x9) 08:07:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = accept4$unix(r0, &(0x7f0000000440)=@abs, &(0x7f00000004c0)=0x6e, 0x40800) readv(r1, &(0x7f0000001780)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/14, 0xe}, {&(0x7f0000001540)}, {&(0x7f0000001580)=""/123, 0x7b}, {&(0x7f0000001600)=""/11, 0xb}, {&(0x7f0000001640)=""/173, 0xad}, {&(0x7f0000001700)=""/94, 0x5e}], 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) fcntl$dupfd(r2, 0x406, r3) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000140)={0x274, r4, 0x520, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_WOL_MODES={0x104, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xa9, 0x5, "b13619b990ba78a422619099d7c01e3e7fa0f20696f57d18887802d96359ff58764362f5a9c6d8e8f20ae99795e03cc71d3dd9f852b0464dbdaa3961415645c7128fdeb4801194c0080aef39793660a8ff188fe619676253c3a5d5b64d80b03ee268acd9d81787a3744a707b6e33a185910d3ecee35f8eda747d38ebae9711006dde82dc17bb5754933afbe46ffc0bfbbea8d3d597378842f93a34375cfce23b9c854e1ac5"}, @ETHTOOL_A_BITSET_MASK={0x43, 0x5, "5d59235746e89b9c49e02ffc221b93bcd3f922d0f169560b9330663f28c8dd77df8fffcb7a7336ae5bc5fc2764e27b40b2d7607bd1cf4316f29ef171d80c77"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_WOL_MODES={0x150, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4f, 0x4, "88358ae3a19459c39ad583f14fd271c1fc23985e062a3cfaf3f71abf618e79fac637b55b5c205dc5049248e9ac4c6ca309b2afbc5334cccc28a7331c935fadd092a49b3b2b3effb4bfcd6b"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x56, 0x4, "009a0330ca4d7f911b26e5ffb48f76eeb1d3df452da68f203e2ce2e88a8e895fda0529515cdc62079d1c324ed6d64aab10cd95180e9c13567e35d25f1a265eeeeccaaf41ff29e7e065368999db7a6a762869"}, @ETHTOOL_A_BITSET_MASK={0x59, 0x5, "209b27dd792db594fe292ff0e1d6b0104d385901d556fd97b1aac1845bf37c61898cff8c907ebf11cacb49547d3569d2398749a228a7fe86ef0c683ac234ef0341330477ce8ff0e24c50efc3fb83f87c928dae9ac2"}, @ETHTOOL_A_BITSET_MASK={0x43, 0x5, "c4caf3ab05fe52912a6de01f8886575004c49c11a5a36f0b26c99c9295c2ea9c35710e3c129707f1b61432d395a4c024a0d01f4e9592e95ecbfb85b79bc695"}]}, @ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x274}, 0x1, 0x0, 0x0, 0x80}, 0x20040010) 08:07:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x1b1180, 0x0) openat(r1, &(0x7f0000000180)='./file0\x00', 0x410002, 0x10) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/uprobe', 0x8200, 0x14) clone3(&(0x7f0000000000)={0x140012000, 0x0, 0x0, 0x0, {0x3f}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x500) 08:07:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x2000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:07:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f00000000c0)) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:50 executing program 3: ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:07:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r1}, 0x1) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x46501, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) flock(r5, 0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r7 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="6b0e46eb", @ANYRES16=r7, @ANYBLOB="0004000072000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xd0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r5, 0x0, 0x0, 0x0, {0x1}, 0xaca8b1330354523d, {0x0, r6}}, 0x9) syz_io_uring_submit(r2, 0x0, &(0x7f0000000140)=@IORING_OP_OPENAT={0x12, 0x1, 0x0, r4, 0x0, &(0x7f0000000100)='./file1\x00', 0x4c, 0x400000, 0x23456, {0x0, r6}}, 0x40) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x810, r4, 0x0) 08:07:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x600) 08:07:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x40) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x49ed, &(0x7f0000000140)={0x0, 0xcd11, 0x8, 0x2, 0xad}, &(0x7f0000ff5000/0xb000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) fallocate(r1, 0x0, 0x6, 0x0) fallocate(r1, 0x58, 0x288da753, 0x95) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x14000, 0x0) clone3(&(0x7f0000000000)={0x101050900, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:50 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x3000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:07:50 executing program 0: read(0xffffffffffffffff, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x0, 0x3f, 0x80, 0x0, 0xde, 0x1100, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x20, 0x2, @perf_config_ext={0xffff, 0x1b}, 0x200, 0x80000001, 0x6, 0x8, 0x3ed, 0x7, 0x1, 0x0, 0x0, 0x0, 0x10001}, r2, 0xc, r1, 0x2) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:50 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x8000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:07:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdef2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000180)=@v1={0x1000000, [{0xffff}]}, 0xc, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x6, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x8, 0x9, 0x3d, 0x80, 0x0, 0x5, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f00000001c0), 0x14}, 0x2, 0x0, 0x9, 0x8, 0x1, 0x3, 0x3, 0x0, 0x3, 0x0, 0x9a0}, r1, 0x1, r4, 0x2) r5 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r5, 0x0, 0x6, 0x0) splice(0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffffc, r5, &(0x7f0000000300)=0x4, 0x7, 0x10) splice(r2, &(0x7f00000000c0)=0x2, r3, &(0x7f0000000100)=0x3f, 0x8001, 0x8) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x201483, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000180)=[&(0x7f0000000080)='\'\x00', &(0x7f0000000100)='::\x00', &(0x7f0000000140)='\x00'], 0x0) 08:07:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = epoll_create(0x80000000) sendfile(r0, r1, &(0x7f0000000100)=0x33d, 0xfff) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x200040, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000140)) dup3(r0, r2, 0x0) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:07:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x700) 08:07:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x107, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:09 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:08:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4800) 08:08:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xa000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:08:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000100), 0x0) 08:08:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x28a082, 0x6) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$tmpfs(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x4, 0x4, &(0x7f0000001500)=[{&(0x7f0000001280)="7da0b2e2c6c315c6d65f9d36827d422a18bf010e6aaf61c8d60ef87b7b7c6438246bbb07ea0efeaabe3adbdf317507bc62ad3fdb2416b17c2ab54db595616b97429ae7c58b0bc9b3b1cc39ff3fd9711a87156808b1e6953edcc782d2935cd3510728303dd67d03776054e0f2c9bcac952dd856a8aea4eb116839d607c2bdbce97fb74b", 0x83, 0xffff}, {&(0x7f0000001340)="09680b10610efdea629681a4d0d90f21c8b43b4bfc755d30fce63d30dd82d6be8b508df52a0faea43f72d4a5dd5ca7f200c48cba9d6844aa68535ed5e9b8c14fcf2954f227d395533e4ceb7c5064a8f1e49cf4d2476dd5728b9bd4539fbee1d0ad83abc6941cc06458920f08ea1e7307b4610a100e649c0b3b193a8bb9bb438791c8049c05a3524c0374c9903a36c8478dc0ee5a3cbd3ebf85917125f52aff8afa535a1c0193133aa355a4ddc4e610bbc10f9d0f96df8abd853e907cfeba209c103a8d31404e1741ea86e5ccf8fa8cbe724a284362398d96f9c02887e5ea54929f4e06f079853c06ec73a206922c86706658b1c3", 0xf4, 0x7}, {&(0x7f0000001440)="ebfded15f1ddcdec90d97b2908db089a298d2ed714cdd32eeb18033c316b99bc387658210676e8befa987f5fc0fe193072e5f3913eaa8745c52c0fcc97154e837698d4a4e66f47fcde4fd514f9042c43aa2a883457fc0ec4c4ec77efcf9bdc0d", 0x60, 0x7}, {&(0x7f00000014c0)="df5b69a99b23e5875e56e3d923bd27da9e274b5434afde19e21be95dc630dfd9f6861f7135b167c7352fbad757de70838c24e83380ffffc8dad927eb84d1", 0x3e, 0x100000001}], 0x321001, &(0x7f0000001580)={[{@nr_inodes={'nr_inodes', 0x3d, [0x39, 0x70, 0x74, 0x78, 0x25, 0x38, 0x70, 0x25, 0x38, 0x36]}}, {@uid={'uid', 0x3d, r1}}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'security.capability\x00'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000001180), &(0x7f00000011c0)='./file0\x00', 0x8, 0x1) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001740), 0x80100, 0x0) sendmsg$nl_generic(r4, &(0x7f0000001700)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x40, 0x25, 0x100, 0x70bd2c, 0x25dfdbfd, {0x1d}, [@typed={0x4, 0x4}, @typed={0x4, 0x12}, @nested={0x1c, 0x6c, 0x0, 0x1, [@typed={0x8, 0x5e, 0x0, 0x0, @uid=r1}, @typed={0x6, 0x2a, 0x0, 0x0, @str='\x01\x00'}, @typed={0x7, 0x19, 0x0, 0x0, @str='uid'}]}, @typed={0x8, 0x3e, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x40}}, 0x4008001) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) accept$unix(r2, &(0x7f00000010c0), &(0x7f0000001140)=0x6e) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) read(r0, &(0x7f00000000c0)=""/4096, 0x1000) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x3, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000140)="2b6eedea0d8d612f1c9460e70491e43865d6c153f01f1157942576389096ce7436f9682269e10a551e492ac9f584ee9749e26247a59bad86530c354f406c85dbe704c1f11b55a73f2691ce72fcb8ac1f5c4b4e571f88b3cf69eca231c07380082459d63439c0504b8b9be96e20b729d5744d1d76bd10ca36db397d8599c6322aef18dfdc1584cea4a3a41ce93ac460787f3359d99055e4109971b6e93f4f5e229d14db8c8264b9b40d2fe1e1039c26eabc68f1099f9298c9f77da4414284e37c43d1df67c4f267fbe7ac6bb2bac37e199e7c425b82e3", 0xd6, 0x3ff}, {&(0x7f0000000240)="417c58dacf9e6cb5066e63d4e51843ccbd587eead770ad923eac5d56bfc031dad1acf63c62df5666e858b1a2fc3c0a1c53a864f81477db8975a6ce45f39f6d432b212376ade47c6636dba699db130a874727b0eeb6da01d100db3460d3dd0e92bac7", 0x62, 0x8ad}, {&(0x7f00000002c0)="d4299511405f8b656f874d51c4447cbcd2aa993572098419fe74c9d18a94710d1a279d3a1e6b1f149702c6637f8e82e0c04bb9b2006b2a41122424d330284d22225a7f5581800d597ef7db3b9f2e1ce58e4aa79297340dacd8f4662640d62e903ac7a1", 0x63}, {&(0x7f0000000340)="f6ed5f117238582f209b0925af5a45d6ccf69140e70ed01ef2a6de755ea59e5ad79dc6e1bab1f63a397e53377814cb53dbfaf2b61d1b93314c33492726b77e0228442ccec1340e", 0x47, 0x4}, {&(0x7f00000003c0)="3085a04f6f6ec87fdff0ab7696d0f44f9f8fc5e72a594adb4d8fc3111cb025a522fa5e92ea2852cf09fdc560c065141f974c3c1be6aec26cc84bd5c87f4a28157029fdcb09c4e9e4bed17237eff6674462a7ac5b58f56352196c3cae4d7573fce87d6d59a463c1638fd29a48cbd7091e852065af0aa99eb1f6127018d4427e780d1c82c9b84bd6443a50fbe2cd71e6aed1ab263c5d9d628fe05b3d8542fe75d49f1b6130fd8fe146f7c7eee38365cc60a7368f2c785f51ae48aabdb32dda24104134d391d6cd3229612da36db880e2c0247bb1057416d9ad41", 0xd9, 0xb45}, {&(0x7f00000004c0)="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", 0xfd, 0x1000}], 0x4030041, &(0x7f0000000680)={[{@shortname_lower}, {@numtail}, {@numtail}, {@uni_xlate}, {@shortname_mixed}, {@utf8}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@measure}, {@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, '%['}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fsname={'fsname', 0x3d, '-'}}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x4) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r2 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb357b87ae67d5b00d5a28eea29113393d0e1c7391515c7ab7c00", 0x2d}, 0x48, 0xffffffffffffffff) r3 = getegid() keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000300)=@keyring={'key_or_keyring:', r2}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) mount$9p_tcp(&(0x7f00000007c0), &(0x7f0000000800)='./file1\x00', &(0x7f0000000840), 0xa02020, &(0x7f0000000880)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@mmap}, {@noextend}, {@access_client}, {@cache_fscache}, {@version_9p2000}], [{@fowner_gt={'fowner>', r4}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fowner_gt={'fowner>', r5}}, {@permit_directio}]}}) keyctl$chown(0x4, r2, 0xee01, r3) chown(&(0x7f0000000780)='./file1\x00', r1, r3) 08:08:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x2, 0x4400) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xec, 0x0, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xff}]}, @TIPC_NLA_SOCK={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xd4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffd}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffe}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5a73}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x40004}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {r1}}, './file1\x00'}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x151002, 0x0) 08:08:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x4}}, './file1\x00'}) mknodat$loop(r1, &(0x7f0000000100)='./file1\x00', 0x8, 0x0) 08:08:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xe000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:08:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(r0, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000180)=[&(0x7f0000000100)='+]-[%\x00', &(0x7f0000000140)='@&/.\x00'], 0x0) 08:08:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$CDROMMULTISESSION(r0, 0x5310, &(0x7f00000000c0)={@lba=0xfffffff8, 0x1, 0x1}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x4, 0x3, 0x0, 0x4, 0x40000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x81, 0x1, @perf_config_ext={0x1, 0x3}, 0xd003, 0x2, 0x80000000, 0x2, 0x386, 0x0, 0x20, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xc, r0, 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4c00) 08:08:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = eventfd2(0x3, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000100)=0xfffffe01) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) dup2(r3, r2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000000c0), 0x8}, 0x0, 0x0, 0x1, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x1}, 0xfffffffb) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e00e8d50000080000000000000002800800000000000000"], 0x1c}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x6}) fsetxattr$security_capability(r4, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x3) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[], 0xfdef) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000140)={0x6, 0x0, &(0x7f0000000100)=[r3, r1, r4, r1, r1, r0, r1]}, 0x7) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x400880, 0x80) 08:08:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x10000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:08:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x48100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff21) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0x86, 0xcff1f004c3309908, 0x9, "1441d831204d239a35f2065531e7eb22", "cd2d2ce8e76d423c2d7731e4ffcbf5cace7cf72c73a3b5aa5ca8fb310141141813b36d2518c1644cd3599b4927522d2d832ee83a1ab93f45c3abb040b516cae44399ae99cd549b3f86763c5300812b73a531af470c90c3071e8a7e29069712e5c610544933f6ee49a66686af16b66f1445"}, 0x86, 0x1) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:29 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x10000000) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x22, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:08:29 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6800) 08:08:29 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x1c000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:08:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000200)=ANY=[@ANYBLOB="1a00000000ffff00000000000000000000000000000000000000000000008ba2b6394755b4e2192a6c3741bcd0ba4239007a816cf14003f7a27a6b2feb3d2f306d1209d4236a54f8f6989afa86f1c829c8a9e3db720991712d362fefa699df6ec94716f49d661e422d544baf9af3ba45e2fbb8163c1e4934b4041c3319c3c6fcdd255306e8f4b7b859d98957846ed4364cc22256fa28483fc86d16aae5e82561ae5dfb46e77d9447283aaab31a4a249cb8e5159a7a163c3d1de901f7452377aabfb8304686f3273f0467d2a5ebf4142582558139565da3e8c5178d577f39658d19e278ac9b2b30531b06289f4e4094ab45"]) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x1, 0x0, 0xc2, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f11}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) signalfd(r1, &(0x7f0000000140)={[0x4]}, 0x8) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f0000000200), 0x100) 08:08:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800000000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'bond_slave_1\x00', @ifru_map}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5e, 0x84696, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x8}, 0x0, 0x0, 0x0, 0x6, 0x7}, 0xffffffffffffffff, 0xc, r1, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(r0, &(0x7f0000000380)='./file1\x00', 0x22300, 0x10a) mount$9p_fd(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300), 0x22084, &(0x7f0000000440)=ANY=[@ANYBLOB="74726119f655b24a00000000000000", @ANYRESHEX, @ANYRES64=r0, @ANYRESHEX=r2, @ANYBLOB=',msize=0x0000000000000002,aname=/--.,cache=none,smackfsfloor=\'\x00,obj_type=\x00,\x00']) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000200), &(0x7f0000000240)={'U-', 0xfffffffffffeffff}, 0x16, 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="7546863a2281ef9a370c4fa781ff884ff36b89bb6389c5af4b50e3dfeae43e00c83cee03c880794d83", 0x29, 0x79) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000180)=[&(0x7f0000000100)='\'\x00', &(0x7f0000000140)='\x00'], 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000400), 0x80) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) ftruncate(0xffffffffffffffff, 0x5) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000500)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="06000000000000002e2f66696c2205e05a8eeaf6f5653100"]) 08:08:29 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x3e000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:08:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000140)='./file1\x00', 0x100, 0x103) r1 = syz_mount_image$nfs(&(0x7f00000006c0), &(0x7f00000001c0)='./file1\x00', 0x7f, 0x9, &(0x7f0000000940)=[{&(0x7f0000000200)="5ff9839be4f09b38220e8492a5e114c2bc9f185c584a95f2409a22a20d7594473937ca8f775417595a57f223a9eed613969038fcb46ec8574299c29470dbee1ede811fbe342c29573ea2d4dca3aa55cfa98bf6de36fcea3bedc2f66da03c5f6a66cfba6974f355a74f050ef8f4fb40368667875ced24a3900e88f05b37c240ff394d6a45c42f0af14649c1c1ddc9d493e435bc7aaf1ad96fa870fcab223d3d5e18a77e7218d69b734d78d32c984caf34eaf52630e45b7bc880efd6d60c18216602d17f754205df39195c5e9fc66b9778e84d54bdcdf0ce530fef25da2c33cccebbd26d5706f64e342527b916105022", 0xef, 0x1}, {&(0x7f0000000300)="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", 0xfe, 0x1}, {&(0x7f00000008c0)="f0123bf33743569b413a8fa566be2ca1d1b7f693b8a5fbe0ef7a50944800f3542b639573270aeb7442e1b546d2e8988d4002885d518bf354226ce44416923a8faa7e2dbbb9503b023a8869697cc9e21902abfd6ef5f0fbe40d8603b11ea0e3", 0x5f}, {&(0x7f0000000480)="9d787c021ecec58237f2339a61e8dd03f5b1eba5e5975f62d160c464beb1d4291d790c1c958407e6e62096e3f5d95a5f1072217aa2b6a86b92c6329929b45e3a6114e6b1aa3c2a0c33e413af986e98fc003e87c7e175bfc1d476b54e25b48969a066bec3da97a38ff2675ecec89322024d4c33f993d4e0bcbdeec057394d1928e35e55f63d2cc7647bd547db766a20570cef60980d997618e3d54c0fe2dae7a924eefe89da87e0729ba2f83cc270dd2d6a877f9cb65826559502aee9d85d9589257123f45a89", 0xc6, 0x40}, {&(0x7f0000000580)="755ea94232af0856c10e72b974ce561823f94b5b19bb18693e4b51a0fba12fe345f5b7c5381decf79dda2a839bf752849c12be16bede11133118e71ffc22df22537d8e82678568e3d56ba98a977b2c0490f4f59c001cf4fde3e6aa", 0x5b, 0x3f}, {&(0x7f0000000600)="b37d4f11ddab7603eac26d7bf253070d886356a5f7315e28157df6ce3cd273967b541eef8a9aec3039d0fb4aed8e5c8f2ce6a9247d79c2a01fea160773fe68e4e870698ba07be7862492976c99705826935e65a4117e7b2957d7f28f6fd969df3be2a88bcfd47f19e6cae77581a9d7e6996a0d787f2ef69b96327bc0e4f4f573eede646b4fdc6e2a55d95d35cd733e76c46deb25b9df2afcfcc9b4d6ae1beca45e757542c10d7034f1d21d", 0xab, 0x5}, {&(0x7f00000006c0), 0x0, 0x2}, {&(0x7f0000000180)="42d1fc9409ac8a6eabb5e0e09d3b63dcefd9733ae137f254de83ab233face17a2eaff7807d0239665327120786434bb47049ea0ec8", 0x35, 0x40000}, {&(0x7f0000000400)="89780db5beb3e72fb15462e376c0309ec70f2acf4df6e345c04a", 0x1a, 0x7}], 0x8000, &(0x7f0000000800)={[{'\x00'}, {'}^'}, {'\x00'}, {'-'}, {'\x00'}, {'\x00'}, {}], [{@obj_user={'obj_user', 0x3d, '\x00'}}, {@subj_role={'subj_role', 0x3d, '\x11[}'}}, {@pcr={'pcr', 0x3d, 0x26}}, {@measure}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@smackfsdef={'smackfsdef', 0x3d, '\x1b'}}, {@obj_user={'obj_user', 0x3d, 'measure'}}]}) openat(r1, &(0x7f0000000880)='./file1\x00', 0x101000, 0x42) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000100)=[&(0x7f00000000c0)='\x00'], 0x100) 08:08:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r2 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r3 = clone3(&(0x7f00000003c0)={0xa220000, &(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0, {0x3a}, &(0x7f0000000240)=""/221, 0xdd, &(0x7f0000000340)=""/8, &(0x7f0000000380)=[r2, r2], 0x2, {r0}}, 0x58) r6 = open_tree(0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x1001) write$binfmt_elf64(r1, &(0x7f0000000940)=ANY=[@ANYRES16, @ANYRES32=r4, @ANYRES64, @ANYRESOCT=r3, @ANYRES16=0x0, @ANYRESOCT, @ANYBLOB="11ab8aebe1377eb1706feb44df67092c8013c2b0724e2bf3b82f4c6353faa2265bbb9a83aff00dec65f0759e86542a760aca09333acea47f60318180", @ANYRESDEC], 0xfe51) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000840), 0x0, 0x0, 0x100800, 0x1}, 0x258) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3, 0x1, 0x1, 0x29, 0x0, 0x8, 0xc8000, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x5, 0x101, 0x0, 0x200, 0x30e, 0x3, 0x0, 0x39200000, 0x0, 0x200}, r4, 0x5, r6, 0xa) r7 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r8 = gettid() kcmp(0x0, r8, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r7, r8, 0x18) r9 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r10 = gettid() kcmp(0x0, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r9, r10, 0x18) clone3(&(0x7f0000000740)={0x2004000, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500), {0x28}, &(0x7f0000000540)=""/212, 0xd4, &(0x7f0000000640)=""/176, &(0x7f0000000700)=[r5, r8, r10], 0x3, {r0}}, 0x58) 08:08:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f00000000c0)='./file1\x00', 0x8001) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6c00) 08:08:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x7f000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:08:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x10001, 0x7, 0x76, 0x8, 0xcd}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xe8030000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:08:48 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121000, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:08:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8040080}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x20}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000019340)=""/102400, 0x19000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xa, 0x0, 0x0, 0x1, [@generic="487fec864b24"]}]}, 0x28}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3, {r2}}, './file0\x00'}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r3) r6 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r6, 0x0, 0x0) close_range(r6, r3, 0x0) sendmsg$TIPC_NL_BEARER_GET(r4, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x90, r5, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x7c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xdf00}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}]}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x393}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4f}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x90}, 0x40090) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x148, r5, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x9, @empty, 0xff}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @private1, 0x8}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x80000000, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffff8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffff01}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x22cc}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x80}, 0x150) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) fallocate(r1, 0x88, 0x9, 0x9) 08:08:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x80000000, 0x1) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000018003d4efb73aff4", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x4200, 0x104) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:48 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7400) 08:08:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0x1}, 0x0, 0x0, 0xfffffffe, 0x0, 0x6, 0x0, 0xfffc, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x4, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) open(&(0x7f00000000c0)='./file1\x00', 0x101200, 0x0) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2755.097931] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=70579 comm=syz-executor.0 [ 2755.111376] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 08:08:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xf4010000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:08:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xfdffffff) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:08:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x200000, 0x25) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x20) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x20}}, './file1\x00'}) execveat(r2, &(0x7f0000000180)='./file1\x00', &(0x7f0000000240)=[&(0x7f00000001c0)='\xaa@#+\x00', &(0x7f0000000200)='#\\#\x00'], &(0x7f00000002c0)=[&(0x7f0000000280)='%\x00'], 0x400) 08:08:49 executing program 6: ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f00000000c0)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f00000000c0)={0x41040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:08:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x7a00) 08:08:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xfeffffff) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:08:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="d68000000000000000000002000800000000000000483bb693fa67c3464fb0b841112d3641beb2f23ddccb137a4f524041b6f0eac56d6ca0bac1d083ca6e973a18f2b7c621ee06f568e52aab4af4a3d488def993fe3ac4c286fe19fdb82ed90946f3b4ae1707b536ba10e02bce1d9b95c4625c94d84e71ef9d5a2dbc382f84eae753e53c195ba4e04489c541f0dda50b1a00000000000000"], 0x1c}}, 0x240488c4) fallocate(r1, 0x55, 0x4, 0x4e) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) execveat(r2, &(0x7f0000019300)='./file0\x00', 0x0, &(0x7f0000000340)=[&(0x7f0000000380)='\x00\x04\x11\xd9F[\x8a\xb6\xea\xc4\x0e\xe0\xa6\xc2]WY\xb1\xe6\xa5\xf5\xbc\xd7Bh.\xfe\x1a\xb1\xdc\x97R&\x8b\x8e\\\xda\xf4\'\x88\xc9Dr\xb0\xdfh\xe08\x8a\x10\xc4\xac\xdd\xf1\xe2[y\xeftb\"!\x8e\x86\xa5f\xa8l\xcbF\x17&\xbeN\x84\x94\xc4H\xe6\xb1.\x11k\xe9{\x88\x00\xdd\xf5\x90\ay\xb4\xaf\xd9', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='6\x00', &(0x7f0000000240)='\x00', &(0x7f0000000400)='security.capability\x00\xdbp\x90*\xc5\x9c\xf0\x8d\xba\x8e\x1b\xa7\xbd\x9a\x96\x88d\xdb\x9e\xd7:\x95\xa1\"\xeb\xf94*\xfe\xdf\xb2}\x80~\x03\xdd\xf8\xd7\rHM\xb5\xca\xf8\xf3\xfc\x9cF\x00(\x1c%1\xa2\x18B\xae\xa9\xa2\x8f\"\xecD\x89K\x1bo\xbeB\x00\x86rw6n\vM\xa7\xa2\nR~,\xce\xef\xd4\xf3}z\x97g\xb4yj\x8aYe\x10r\x9c', &(0x7f0000000300)='security.capability\x00'], 0x0) 08:09:09 executing program 1: write$9p(0xffffffffffffffff, &(0x7f00000000c0)="627b288501563b22e4bb0a686bd41e19b70a6010a1f65fd14257f577c2c64bb1cf7c3113cf9b7b51212478c5e372e2091f33e53a402ccd51542c9bc870d9cadc973c73891ed6d7c0a1a90235acb2b3b4e30ce4a1a2886ec5367f0fba1d1fae2ba653e3a284fd33107c7b15c4e1f2e6d6e75046fc388399b117e3c304541b2fc4979215bbbafea4e34635caddf17aadfbfe38454ad6a673326901e55226c686", 0x9f) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:09 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x8983, 0x7ff) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:09:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x80000) 08:09:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xffffff7f) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:09:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x5, 0x1, 0x1f, 0x0, 0x0, 0xfffffffffffff977, 0x0, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000000c0), 0x1}, 0xc, 0xab8, 0x176, 0x2, 0x5d, 0x101, 0x81, 0x0, 0x5, 0x0, 0x1}, 0x0, 0x2, r1, 0x2) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = dup2(r0, 0xffffffffffffffff) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f00000002c0)='./file1\x00', 0xa8e5, 0x6, &(0x7f0000000700)=[{&(0x7f0000000300)="20ceea78c91d2f6bb0d007a0222c79ca0d7fcffa9695c0fa7629589b4fae7320bb9e294474040ffc5848c7e4aac3e6816d2d66954c085f81d5d0b56fbe2e3735dc66376295ffe818f2f45e80", 0x4c, 0x100}, {&(0x7f0000000380)="cf50125301c859e633aa9f5e9c80c8a144563314a7f69d718e72160f5d4a3f6a4000601a36ab17b7d2dd587ae198d9068a91bd48e464fc39abf3329dc13a8a8a542ea6b531d185dd95e5d7dd964dde89d1", 0x51}, {&(0x7f0000000400)="a5fc823008054a5a99994e7485cc3cfe753935da4588fb5dadbddf6383e51691c87fcebf9acc41d24e65623bff59bfc82b5002b6292921a67d744c517881780ad9b0c86acd3577ec5e6036060b761f73569373b42d3ab37908c66bad924aeed56a", 0x61, 0x200}, {&(0x7f0000000480)="7362570f7ec99531cb7f9ce546b8c5b774c0446bb20c976c11120706ea7d7da36733452074472e332628df59f5f5c4ab41bc5a1583c39b75d8a2b99de3653519faef673f0a4ef5259827ffffb2f8f777fea0517c5c4ff78f", 0x58, 0xffffffff}, {&(0x7f0000000500)="c84056e04709f80054e6f1732b7912bbd223bb52cd7a3ab126e29009c3e8a5cd1bf8a2c21a757380782253cda68a45b7c4074edb35499725c7f7007ee330da6d970898de3147fa80529132a3918fd29196a63e78bc117db2211d05100cea8df724462f809b4284a28f4b776e94a30bd8a415930a379b270084d843e8cdba89d8fb029edf23f7eefc6c3972d54ea320590950c315d9388ce0f169d12d687c55841723c174d77b0fd0a009113c04a215566fdbf543a751a6a7e29195976af8e05970c8d32867d891eadaadc9ba17d72a969e4efec74125897992ae765016117c10f0bf807043a3e795a78d32660094a1c9", 0xf0, 0x56bb}, {&(0x7f0000000600)="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", 0xfa}], 0x412, &(0x7f00000007c0)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@debug}, {@nobh}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}], [{@measure}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@seclabel}, {@hash}]}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x110418, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_none}, {@afid={'afid', 0x3d, 0xfffffffffffffffd}}, {@cache_fscache}, {@cache_fscache}, {@cache_fscache}]}}) fallocate(r1, 0x63, 0x0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ftruncate(r1, 0x9) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x15e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x8, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008004}, 0x80) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000880)=0x6, &(0x7f00000008c0)=0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) 08:09:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x581043, 0x0) io_uring_enter(r1, 0x4ab6, 0x2b9c, 0x3, &(0x7f0000000100)={[0x239]}, 0x8) 08:09:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x7fffffff}}, './file1\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x6, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = socket$netlink(0x10, 0x3, 0xe) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000180)={0x2, 0x0, &(0x7f0000000140)=[r2, r3, r4]}, 0x3) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000052c00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000052e00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053000)={0x376, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5, r6}], 0x6, "5c83c9bf8af498"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005b200)={0xff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0xf7, "29f404d097dbcd"}) 08:09:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x1) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xfffffffd) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:09:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000000c0)=0x7) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x159c0180, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffa3) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xb4, 0x23, 0x200, 0x70bd29, 0x25dfdbfb, {0x4}, [@generic="ca2281dd474ebeae4296c46ad231887b4c4fffa22223a5f9fb2a8ae4fd20b6978db72d1795f2b0e56c86b37195e0a6a82ee8d1a17625e522252d043fd73c40371de3743264d121a9524def1f84d6112c3346f43dd31758f72c0e68c7bda9b02807b6617ee61ccd7b49e219eff1926758895d9b1b3f2b8998611fefe22460e715ec616afce0cafafbfe3b1177d681ae03a048e13cc8d92469fcd8e3a05e52"]}, 0xb4}, 0x1, 0x0, 0x0, 0x8}, 0x8004) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r3, 0x0, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {r0}}, './file1\x00'}) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r1}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x5e, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000000c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x4, 0x0, @fd=r4, 0x34, 0x0, 0xd6, 0x7, 0x1, {0x0, r5}}, 0x4) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) [ 2776.016460] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=72350 comm=syz-executor.4 08:09:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x9) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x40000287) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x181800, 0x0) ftruncate(r2, 0x1000003) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000140)=ANY=[@ANYBLOB="0100", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00./file1\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r4, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r4, {r2}}, './file0\x00'}) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f00000000c0)={0xffffffff}) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xbff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) fchmodat(r2, &(0x7f0000000100)='./file1\x00', 0x40) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xfffffffe) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:09:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x1000000) 08:09:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x100000e, 0x13, r0, 0x10000000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000001640)={{0x1, 0x1, 0x18, r0, @in_args={0x1}}, './file1\x00'}) dup2(r2, r3) syz_io_uring_submit(0x0, r1, &(0x7f0000001600)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, r2, 0x0, &(0x7f00000015c0)={&(0x7f00000000c0)=@qipcrtr, 0x80, &(0x7f0000001500)=[{&(0x7f0000000140)=""/176, 0xb0}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000240)=""/161, 0xa1}, {&(0x7f0000000300)=""/132, 0x84}, {&(0x7f00000003c0)=""/123, 0x7b}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001680)=""/139, 0x8b}], 0x7, &(0x7f0000001580)=""/42, 0x2a}, 0x0, 0x20, 0x0, {0x2}}, 0x80) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat$incfs(r0, &(0x7f00000000c0)='.pending_reads\x00', 0x80180, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x6, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {r3}}, './file1\x00'}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x84106, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, &(0x7f00000000c0), &(0x7f0000000100)=@v3={0x3000000, [{0x2, 0x6}, {0x5, 0x80}], 0xffffffffffffffff}, 0x18, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r2 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = gettid() kcmp(0x0, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r2, r3, 0x18) syz_open_procfs(r2, &(0x7f0000000140)='pagemap\x00') 08:09:28 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:09:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = gettid() mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xd, 0x2010, r0, 0x10000000) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000000c0)='(\\-#+\x00', &(0x7f0000000100)='./file1\x00', 0xffffffffffffffff) r3 = syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', 0x3, 0x1, &(0x7f0000000280)=[{&(0x7f0000000240)="6441075d2bd0a1ad24b95389d31a817228de5e84f820a468e3ea3bcc987ad59127fe4045ee19ffd780bee0e137063d044b4c8519557585", 0x37, 0x7fff}], 0x10010, &(0x7f00000002c0)=ANY=[@ANYBLOB="285c2d23663d285c2d232b002c73010000000000000600000000000000002c00"]) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) creat(&(0x7f0000000700)='./file1\x00', 0x1) setresuid(0xffffffffffffffff, r5, 0x0) r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x2a0200, 0x0) sendmsg$nl_generic(r0, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f0000000f00)=ANY=[@ANYBLOB="b00300002900000126bd7000fcdbdf250c000000080045000000000008006a00", @ANYRES32=r4, @ANYBLOB="8301618008004300", @ANYRES32=0x0, @ANYBLOB="19cd9ddde0db4551a2a9a91b12db6978349042fe608ef9ef7150d72fb8a1786c92340eebb782319b838bf8944e7999efdc3ee4452bde78652923e8f0078dfce372c6e7575b271f8c6d4ad3c9905a8bb0b26cc0016ec3d52c3283816f5d081ea7edc23b7fce88e708008400", @ANYRES32=r0, @ANYBLOB="08001a00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="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"/538], 0x3b0}, 0x1, 0x0, 0x0, 0x4000091}, 0x2000011) openat(r0, &(0x7f0000000740)='./file1\x00', 0x2001c0, 0x189) openat(r3, &(0x7f0000000300)='./file1\x00', 0x80000, 0x0) kcmp(0x0, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r1, r2, 0x18) fcntl$setown(r0, 0x8, r2) 08:09:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x2000000) 08:09:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102387, 0xfd31) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x200000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:09:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) dup3(r1, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:28 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0xa8) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:09:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x8000000000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:09:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs2/binder-control\x00', 0x1800, 0x0) dup(r1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x88300, 0x40) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xfffffff0}}, './file1\x00'}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r3], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r4 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) flock(r7, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r9 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r7, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6b0e46eb", @ANYRES16=r9, @ANYBLOB="000485f37675da6d96b6"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xd0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r7, 0x0, 0x0, 0x0, {0x1}, 0xaca8b1330354523d, {0x0, r8}}, 0x9) syz_io_uring_submit(r5, r6, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r4, 0x9, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f00000004c0)=0x0) syz_mount_image$nfs4(&(0x7f0000000200), &(0x7f00000002c0)='./file1\x00', 0x7, 0x3, &(0x7f0000000440)=[{&(0x7f0000000580)="cd4f2252c93bcd90a4a2d750bd6cfddfbc9a1b55782303874dcab0e69fcd79aca1a01fa4bb64be56dfe75a3d78c953ee7a0c2786c82dfae171ff8e66bc67d7cded583da813ded3c29a3700f0ec861189bccd16f0784f765a3d2347296fd0c06df59a4d9279ebd71b6c35310f4076bd616d51b3f2f47c2f1b1bec5d5e2f54dd04882a1fb3a0c60e0475c82c5f0ec14c3dffafc0718ca5499d4a2e60d83a7278d115becbd62b5800d15f3e1f3651dc362065d2c2058a172721e804a7b56004f02abdd7beabb8c55e5815a4e52f35b6439c81a5618c6aa317b514b643830cb4f2a27ec03192684b7f678d4a19b1a7a0f89a0fd3f66fdc8e9cee78ee66e36cecf003997420ddfb0136c4345614613906401d3e18553f5a98f5fe2769b4afafd8c40653fecf25941d9d606ab7d07e86e1876a585a72c23fed15a51ed95d4b232d6667deca6f1f8ca8232b56df11e89b3fc4d078f8615561e24b13ee9f84cf2aa89a79915aa7d7b1579c871913ed6be881f2afec618e47d180398e873978bc2b7149a77f41080846e608928c0f5c2a55a907277ef10809c79be26607886c5d667fdef6b7dab7ec62d77962503ce749ddb054850da5407443ecbf93a6657c4a9ca37374cf43119ef16d1d9aec2efb5321c5603355bef1a3b31d52cd97424f5d850409e30d132937e3e94c933fa5c6c139d5cba183ca9462e3f5c4cf77e5b9b2099836a8637e11e32518e818542842f34ba0a0c575b4db7377e733c25cfbf4e632b8e0ecc21907fea4329fd49bb9d9398509a95e733f4bf14f89983fbbd3dc7fd907e39345c91444213b05f0877c6216634b658dd639b09dc2142e107d492b34117258911f9a4b2b902f72f0b6c6f0423c28875714adb020fbb4dfea52c9fa8d38612e94500c0549ac90d71976e277f1857f5fc4b4a7c7d03640c77a921b7619922d77f480bb9a1ce89b5d7c9e077959e378099ac3cdcb2f3bd931b7859865561a9e1e4a205a37ba601b082bc8d875bdc15a05e0c58336061a218939864a8c2ba8ffc9e95d7472926ac122c796c4a15d1ed1410892ce84b6dc2d8796c2a07d0134b2a7e0604fa0bfbbe3c6230d971c0a8e40b99b7a25839cfb4c39d01dfcdea2f73ccb5e9d345f9339d53f4866412a2a9c7555629123a672a2bce7b38ade3ce5ee78ac271fa5d1b33dcff0268ad5858420d2a1f2663c39f0d2bd2a7ddfee60cf02534fff02f617ab9ef9d9636692aa653b529097aa75daa6c3862e99596a769f1a002fda56e4d2443d981549a12347806fbfcc86eec2ce4536c235f5f3d32d9b1febe63e8e23c65479596b1e59a303125856fdefece211fbfe33af4c1c22d7a4017ef29bf56ba57d87d8614bca73034ed80d4d0babaea2093a99a98f654194a02e0b018421cd8b7cec23b41649e374e2d5af2648da657e3a2d4c282a50032108ddfcc7f8e34abae68d558fd7d2aaea5bb18937b485a0c4e3ac7a766d8889e1b8ae01b488df8cc4750919e726ff1950ff68576f201c8ed712b18ba3d78ab59eaf2ea5586275bb5b895cee4f275851a076bab9192ff2b307b5a8019e670b43878e1d577a0470781f5f08bad67fa621e1ac6fa219c4b3dd6a8e92d1bb355f5a78dd1d1b3e52b1b2737ed8625ac95233a4fba9c35fa31aa1d522cdd6d8d01d7ea22188525312500206f0803cb2bd7255e991e68479bc773fc08969a76ae96785d81585b1e81d8a380da12b702465130c6514cd89d50748a58ba03166c2b314c5003bb006a19d17b1f74f9a12b31f71dc331a1f8ecfb52ce99dc2bdb49d4631bffc070f4da3a703758166d58ac9c732ca5c0581e6978ac6ae7af6c0bf0d146f380104f9d0d3570ebd5a24ffb4a53f45fe47a213b3e2790b1592df9693526e708c44f8ff3241cc958e2142d4d453399b2c12bd816faeeb31f97138b7e38511c7d652d4286199797f9372c2986f24abff274d15cfd6f3f42af4151bac428bf37b84c4d8e83a00b6f81371a364d219217789851552727dd0765724163ac015e5a88f18927355eb7e48ec5512f1befc62a5a202c3f42945ba4e89f3d9aeabb992abd224ebe535847bb38fea5f82420bd07c12ea13681548929264ded128590a7dd089ac7f15fd632beb1be9c83947af64d65c4670fb7c8d9060e6f62e11d007a6f39f77520506cc5ed9f33d171b29d2f6ea35d2555e0d3c90891470809a85d7e5e90a6e5e8373828cf66b2b01cf210ad7887287d91247db7e06b1c695bea8440a81da9f75ad1438044797927e024aa99b52e56e1aa7267a1b3213c84e8efdfea43cbd35f0ba48689136ece0ff8d46ba57bcb131045d5f151f1a43771f3d0fdcad35e0e0fb17835ed281ee6a1e3493688a0dcc842c30575a1d45d025232f08a9a4d71539b3bbabd5f38cd1e180058ae76e374905d24c8d85de324fa1fd148f2607a52d311f1a6e2eb6326ee9fc93852a60b38d7e948efefa37581d1d7d303d786a2bf4ef082fa768f94406e3b63483235db17584554375a07ecdc13eb79e1117cde3797dcec24e8edd9367d7776ac48d79fbdc305ed77ec3449d9a7ca7bf85123a7cc24b5706462bc7c897b69bf1beebeaf24f1f3be7597acb32810b5d6891d51f9d88ad37e0b3e4f230fd0061a771c8b6e7b4f4bf037dca64ede5594f33a090db5b4eed7e674bcd7d90b4799ed957c4306e99c2b6d652d32e40b0e3a0bf9a5b2990bdb62ad431b724dc746776d3e24f22ac7c83f3aff9fd6ae813cd01b28702d91752c4835e7124f0ab6712faf7824244d0ead3ba23699707ecfe0998638a9caf44891d2d34e5070471a5123a6c393b252ff34200f50d6358ab4789953e1f79a5e4776566cf8fb5f34bcac0824f4a5feff4b009427aad77de51681d1e774969cbecc908f8aa2ff4e86a22d42f769b73bd6fe53c71f70808dd67864186222456394c20c815945bfa76d388f9ffeaca568e4c66d6b36c4fd8be2ba768def5fb3cbb739fcf34394b8566e61c4a44a418f6ab7be3f8a9b46e4445d8262c1231af17bc555e06fac5d0dba4572bfc757806977a112da44b8ca4db579201341423b03dae3bdcf7462a59dfc99a6cb1b2c2ca72e39c1796c871afafbdd6a30a251f17edd0fc4bf23108e7fe44017b92d04b5b2354bf856c6caad88d560374b5a1f7f6277f0206da8d038cfbcdf3cdfd97de1ee25860768e7b8d4a052147e8c44f4a49e771050fee5a8354e0e4461566be28a7aa867169a496be29acfbc471edef8af8ee36052e64c5ed50a004b032e922a85eb8a015f19c54852f0d26380b20e8bf9ca219eba10557e025be3b4b5082d40b4c840ac6cbb557148e935294f1052a3d623481833c6e065ad4491dc50f5e9c621858ed31f8f413aad9c9522724d3e855bce5d925f9b2bbf7434cd7adaf9d96d7bf28139885bdde798914783fd4d2bbfb8b40133d5c85aa92b86ba4ee499d26d20e9b30fd5a18dfa0a424114aa5c9194497e9106c494f777c56a2e0bbd705b196e7ced584f10af5aed34beb295bcac570dc377fa2ac04d3b777561e0a7d138ef9bb279518c4bcb1e0d6ba3b7dd66ebd323a47721517a063ac446fe196ae5e9732996b93ed88039e5381bec8f8141619452a80c1d836ec0208e21a5862d76be472cc3dbf21d9e8872e85578d02b9ca4cad440dfc29321fd03a8d347fcb4a458d22fbc1d20c2da1fb65447e6a83d5e6c1f385f268822c3284e6c982de1c547454749c5228328d7ee9b3d2b39a85e22dd5e6cbe445b639f19f429ec23375fb544a84c97a54bf626baac40020b45eee35c0ba2ef97533619b513a7300e70039d4bc85521a8d7a140ff1fa6b76974b572892210eca0fd0cc8f512b250b0a2d94ea6e323a4264f465f203e6c19c7a06e7e93660ada423348becd0c68977a31725d043cb075748ac47f8907792cee91f3f91363f36696272100be70abf9f54a82f883087a51de38aace012135c024585a0d47daf206a68dedfba0b8552c5c0438ae56274697f404644a297db95381dcd187862da994c3fc5fb67ec132a524a5a0051a96a8f9d6e72b8aeac1b3fae7b678f9a8fd6096cc7e1fb8825504528c47fea930e689d0b64d226c3f0ae92c5464f0a44fe4d63d3585696526c3a54d663cc6f05d5339e6bf936528e77cf50c4fa3e95e413e626e265f5c5b94bcf833c6c05e1c3410c3f38c041e8b8afe0cdc694d90663111fbad49dcae81a69c643883ca6a9f38aaa7afbfb08c4df392bf478322f017d3f2b1714685da620ea473298492aa47dc1f689c03ca9f16a655ada01b678eae0cccf0c1b95a432f28a49e236bd32bd656345db6767bc8bf0ab8b2ed1eafa7249ccc771b5892dd9245d69b53cbd1c8a526a657df5ef59e9d568ded13def1b0e50553face822ec4b185a0e32b3439be0a7711e012f640482ac47c2ce65d021c8bd84e3b202b285131b5af18a21442ac627cc29419c5a50e599dca60e0d21d99603d939e95fe49abe29cbd3c8eb271dbbeeb6cb8b22f4313f1e81f191e1d91d96bbb21a419b952c5623c80403cf8f458422070fa8f8ef9397c01e8f4dedc041eba2b7c6fea8baec736c9e7962ace3e94d5bd8ad72e2062a48d2cd3c7ade0e1ed37eda558fbfb235f96422d7ed28ed2e834b0109a66cd3cac850e5eb67e6f738606438efeffff49e4442a4d95ac202ef4ca7661ee99a95a9b323ecf5bf7982145b4f877210ea37334bdd1bd19739ff7fe4e07b070ad5a9ef20dd0a1e053043a406c1b2180aa1297a46b99bf156745515ec521c5d96f49569e4dc8fecdd1cd3832d17e6a88763a1750f69b70762230e00aaf8452900968d5f66262eb6f3d0a6e5fe44d7ec93aa7b3a0af01e2e6cce51abbef87842b829a6293d5604600ce6b83f951ec95017cae8ef982b31ab44dc3bda6e3f2642b7af0e4dda033f07b27f361fdf13f9107b6fdaea1bbc1063b8126caad5f90a55d2637ae1b0641a313ea9fced2e4ca83b80ca399d7db50c2213ddaa7d24a8b278c188f604c37034739be8678313973228eb0c62998314206827d4ebd8fba1717828b040dd57f423719fef9b08535ec620f286647ec41dea307dfc1f2b07e5fa016e0cf2fc1385080f4ac96900fc240c921c723350100b253cb74f5ae722c7b73cd9474a1ae4ab1376f30ded3ff6b82128782c99c75b6f2572239b4e91e9915dc110ee202d65bbf5e6d84c1d804977bfb6df8ac46783c38fe4f3b0ed313769aa55e18204650f72cfef6b5be95ffb1437242ada15f14197653714508199e7073cca7f7ccf6a9ce0ee001114fe0397f323d9456a35226935f5c928f7a9fd46ab3d3badd5bfbf83f7631f71daeb02aeae33f4b4b6fd390a7b38e31d65c6b7dce518345d74fb79bbfea69e03ecfb4138d6c3f31456b44c288b7537422b2deba61aa6da21da9ff959a2a46e55e815d67ab3677020e39db44af66d851e83d9e9632b0b3803f9b1ad50925a640e8b1bf2aae23b89c12041ec61365cf63837f8ec4cfe2db2ffef3cfca0f5f78c23ae88ba4c5bb7a73bcee58f5d88846e38f5fd3ae75cd70ac30dd64deb4764e5eca5afa9e170036dac47226c0a808c8c1fd8cb0260c57eca8c897ae5458ee195143655f3f2ea82b4f60bfd4a1eab642664c170d6b11871ce19bf43facdd1844253e8d3afb0ceb0c42e21f1ded454e750231f14a8fcdd1c2470d2ca9b4898ebe89acfdda8411e98d0e5290fcab0a226cfeec285aafb26f1ec1d5ae03a8f0fdb44c9d5a55cd5a5352ffe466494a5eda9eb7b3ec66a815f197aa222a48f50679328b7794b0cffa02b2249fcc5bbb66a065d80c192", 0x1000, 0x8}, {&(0x7f0000000300)="c44d196527ab2e1a7007350c678c033d962e625db46d42b8083f9b5c5afc12b725045d95a9f8de9fbb0c847e2719be6188c011c05d1f600f86845cbdd3df577cab3c8380fa245dd4fe5098ae7cc991278b9a6bd577e2e10cd1b78fdb7271799e4436f11290d65688d9c8266d589a3cc0d98af16acb98e56f1e77bbaa265cfb4126e2f5322257335201668ed341eafbb2879e69f244a7dea279bc", 0x9a, 0xfffffffffffffff9}, {&(0x7f00000003c0)="99c93ac09d419f5e1fbc94fcaf353a4d5ed87cdf9987001412eb737953e98e1f3d8091912ad82281be334b1bc6334b22d1f446f0944b6e8c641270b4acceb0017493edbaff79425e5da4395ee5d8440dc44531bb206176", 0x57, 0x9}], 0x20a0, &(0x7f0000001580)={[{'batadv\x00'}, {'\x00'}, {'\x00'}, {'\x00'}], [{@uid_gt={'uid>', r10}}, {@permit_directio}, {@obj_user={'obj_user', 0x3d, '#/.*'}}, {@obj_user={'obj_user', 0x3d, '^:'}}]}) syz_io_uring_submit(r5, 0x0, &(0x7f0000000180)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd=r2, 0xb688, 0x0, 0x151d4b22, 0x0, 0x1}, 0x7ff) 08:09:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000000c0)={0x1, 0x8ffd, 0x5, 0x3, 0x3f, 0x7}) 08:09:29 executing program 0: r0 = syz_io_uring_setup(0x3, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x300e, @fd=r0}, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) flock(r3, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="6e6843f5", @ANYRES16=r5, @ANYBLOB="0004000072000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xd0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r3, 0x0, 0x0, 0x0, {0x1}, 0xaca8b1330354523d, {0x0, r4}}, 0x9) syz_io_uring_submit(r1, 0x0, &(0x7f0000000140)=@IORING_OP_OPENAT2={0x1c, 0x3, 0x0, 0xffffffffffffff9c, &(0x7f00000000c0)={0x280, 0x10c}, &(0x7f0000000100)='./file1\x00', 0x18, 0x0, 0x0, {0x0, r4}}, 0x6) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000000180), 0x6, 0x202) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @remote}, 0x10) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x3000000) [ 2795.550671] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 1 (only 16 groups) 08:09:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x4000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f00000000c0), 0xd0441, 0x0) fcntl$dupfd(r0, 0x406, r1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102391, 0x18ff7) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmsg$inet6(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0xa, 0x7, 0x10001, @dev={0xfe, 0x80, '\x00', 0x42}, 0x7f}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000100)="76e31a6f62b3ea0b3a65f3f785355ea679ae6b", 0x13}, {&(0x7f0000000140)="70cd04e62afdd0af5d4ad389db15bf4c4d0dcb1170a31895e21b689f40c208dc79e1095fca4d305c171a6135bf7fc75e21a36c45b83220210da08f631830ef5f0b6256166a5810369843a270f3242830e6c65f0a03549577cc0fcc0d6d726d8a1f9a9e44fa9e2166f55fe470ffdbfd058b26c275b026383c8d553bc51b4d3f73d33dc5d69e1186f196d28ac7a7414809df0b23fe309fff90fc6779c4dcbaeb2cb69c77fc8a9bda0c086ed3309c40448a43af5ce494fdf52d03d48ae6422dc95602a093943f68b47d145952e70606", 0xce}, {&(0x7f0000000240)="5d5005026ecb8d01d92d0fa5b652d725e9d8ca803b70d837b80b364b56aaabcda084921c50252eabaaeca82ad6", 0x2d}, {&(0x7f0000000280)="750361edfb030924bd107be3176c838fc8e93a47f09eb37e82cc378c798864056a55b3c11fbee394befa4f9feee3fc9fffe3edde7263d0d8b1247d7f3463db09317c1625cd8f78f3d2755ae005468b6b3ca560bd3e09341909f4ae0f50a5db86ed33b4a974e5da8afd0997e49625f7c5b2efc545a6d5dc11fc3c3c375f7e9478e05444905c9ad3c0559d574508361a61daecc759e1e76cace31f767c073a2b6c693ca478cac65a3571d04792429fef6b26d7f7848a96796bec49eb5e37905864e78728e6ef6f6143b8f784a7", 0xcc}], 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="280000000000000029000000370000003a0100000000000001070000000000000000000000000000380000000000000029000000370000000803000000000000040107040140c910ff0100000000000000000000000000010502000700000000400000000000000029000000040000003a0400000000000001080000000000000000c910000000020000000000000000000000000401090502fffa0000000000c80000000000000029000000040000008715000000000000c20400000fff050200040502fe0104017fc20400000fff05020009074800000003103ff9ff020000000000000003000000000000002300000000000000d80e00000000000004000000000000000010000000000000010400000000000005000000000000000105000000000001030000000738000000010c060400ff0000000000000024062a6700000000010000000000000005000000000000000000000000000000020000000000000000000000009800000000000000290000003900000084100006000000002001000000000000000000000000000100000000000000000000000000000001fe8000000000000000000000000000aafe880000000000000000000000000001ff020000000000000000000000000001fe88000000000000000000000000010100000000000000000000ffffac1e3f01fc020000000000000000000000000001880000000000000029000000390800000000000000000000ff010000000000000000000000000001fc00000000000000000000000000000000000000000000000000000000000000fa800000000000000000000000000039fc000000000000000000000000000000fe8000000000000000000000000000bb00000000000000000000ffffac1414bb1400000000000000290000003e00000008000000000000001d175663facdb8e6eecdb7941888a13264d2f9381f81a9ce80154faa49010359c551ec60"], 0x2a0}, 0x4000) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x9}}, './file1\x00'}) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000100)='{\'^]-,\x00', &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x4000000) 08:09:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="07000000000000002e2f66696c653100a28f4e6f20b3a704567bd642535a5db765707d7cb6f305acb0518c068d"]) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) r4 = signalfd(r3, &(0x7f0000000280)={[0x4]}, 0x8) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r4}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000200)=[&(0x7f0000000100)='\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000140)='-&\x00', &(0x7f0000000240)='*\x8a!{]\x00'], 0x0) 08:09:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000400)=ANY=[@ANYBLOB="da870090e87e000100000018", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) utimensat(r1, &(0x7f0000000440)='./file1\x00', &(0x7f0000000480)={{0x0, 0x2710}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x6, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000004c0)={0x7, 0x7, 0x0, 0x4, 0x8000}) fstatfs(r0, &(0x7f0000000300)=""/197) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000033c0), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000003700)={&(0x7f00000000c0)={0x2c, r4, 0xc21, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BSS_BASIC_RATES={0x4}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_RELOAD_REGDB(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xe1801800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000000) read(r0, &(0x7f0000019340)=""/102400, 0x19000) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0xea, 0x5, 0x52, 0x4, 0x2, 0x6, 0x0, 0x338, 0x40, 0x1e7, 0x8001, 0x5, 0x38, 0x2, 0x7fff, 0x1, 0x4}, [{0x6, 0x80, 0x101, 0x5, 0x8, 0x8, 0x7fffffff, 0x5}], "436853f4c947c6a188a0d91799efd18bfedefdeedc7a812c2f685b119c2409226d4593cbdf1ad9ac0376e4976842adf051fe6b", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6ab) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) pwrite64(r0, &(0x7f0000000200)="0dff659269e239b1cdf84d89fbc150988303c6e8cdd17e7790e532970c5ed71dd1d02583e37ccf6c2b0c2b3b2b394343c54b10d8e0823c72c7217e5b07744baaa070d38d6a6865e57b8a47e291a0a69ea5507a016724867ed43e05199fa37dfff88d2b83385741fcf9d259f144b0e957d38d16582b0128f9183c527ec64b888c5aa5263a6eb27f61d845b39419b9cbb70c1650d6904efc86028b1d59bee8278546c746ee5e7558391ac7d8e8774cf0e21bc2cc6eb3c82a98e902c0a19b0a4b459a87c320d805dff5c9b59786", 0xcc, 0x2f93b5cd) execveat(r0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)=[&(0x7f0000000100)='@%):\x00'], &(0x7f00000001c0)=[&(0x7f0000000180)='},@\x00'], 0x800) 08:09:47 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x204000, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x85, 0x8) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x61800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:09:47 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x100000000000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:09:47 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x200000000000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:09:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2bc203, 0x182) read(r0, &(0x7f0000019340)=""/102400, 0x19000) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000140)=""/224, 0xe0}, {&(0x7f0000000240)=""/233, 0xe9}, {&(0x7f0000000080)=""/20, 0x14}, {&(0x7f0000000340)=""/69, 0x45}, {&(0x7f00000003c0)=""/90, 0x5a}, {&(0x7f0000000440)=""/212, 0xd4}], 0x6, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) dup2(r1, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x4, 0x0, 0x5, 0x0, 0x0, 0x5e, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x4, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f0000000180)=[&(0x7f00000000c0)='\x00', &(0x7f0000000140)='\x00'], 0x0) 08:09:48 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x5000000) 08:09:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x208000, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="120000000000000020000000000000e60210000007000000", @ANYRES32=r0, @ANYBLOB='\x00'/28, @ANYRES32=r0, @ANYBLOB="000000008100"/28]) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0xfffffffffffff001, 0x2, &(0x7f0000000280)=[{&(0x7f0000000140)="b458d1e00106491e252bde3345828c12b062d0f7f498525a55e2abf9dfd27b150e1d502023563cf1fde75e2b8cedea33d331896ea550b17a2af25ca8473e5905b22662ae30cf509721ab81ddde10761631a43321d9a68dba8c690011a20416d3b6c3aa374271b2463a7f2f0ed440ddc7cb6c6d98fe8fbbfefdb21a5eab03aa26affd1cc5a1c4e9eada1d6db87c7903484a3b2d268489998ecc4d86f7c5360c56fb780999d513c32afd67199c8e365bf002b6088ff23bab710c2ee67161131957cc0fc2eeae37937563f4", 0xca, 0x1}, {&(0x7f0000000240)="c6884d880af93e55090a64da6f991c65755c46da181d1029bd7da67371ec391e741d74a29e69d527cbbad52232399e2420c4624b01c1a29af44e961c7a89e8", 0x3f, 0x4}], 0x800806, &(0x7f0000000340)=ANY=[@ANYBLOB="636865636b02ad6e7d6c617865642c6d6f64653d3078666666666666666666666666666666642c61707072616973655f747970e53d696d617369672c646f6e745f686173682c00000000"]) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x40) read(r1, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x2200, 0x67) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:09:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x1a) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) accept$unix(r0, &(0x7f0000000100), &(0x7f0000000180)=0x6e) 08:09:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x300000000000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:10:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) socketpair(0x1f, 0x80000, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000002c0), &(0x7f0000000300)='./file1\x00', 0x8, 0x2) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000200)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r2, &(0x7f0000019340)=""/102400, 0x19000) r3 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r3, &(0x7f0000000340)=@ieee802154, &(0x7f00000003c0)=0x80, 0x80000) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x44cc1, 0x0) r4 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x40446, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffffd, 0x7}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, r4, 0xffffffffffffffff, r2, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r2], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = open(&(0x7f0000000140)='./file1\x00', 0x200, 0x8) write(r5, &(0x7f0000000180)="5698e53e801b19b031adbfe09193a3b4d052f8b923709bade24fe73c0455039d39a8f75f88a8edffec78917b39e6684ab3735b2e591f79fcc3e4d09bdaa4705d5f2b4b41e9a4a7fd4c11a9b8", 0x4c) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:10:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x101000, 0x10) pidfd_getfd(r1, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/consoles\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r3, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x800002}]}, 0x14, 0x1) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1000003) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0xfffffe28) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:10:07 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/tcp\x00') socket$inet_tcp(0x2, 0x1, 0x0) readv(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/231) openat(r2, &(0x7f0000000040)='./file1\x00', 0x6400, 0x8) copy_file_range(r1, 0x0, r0, 0x0, 0x110001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)) fallocate(0xffffffffffffffff, 0x0, 0x2, 0x7) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x2188932d843071f3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x744) sendfile(r0, r3, 0x0, 0x20d315) 08:10:07 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x800000000000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:10:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, 0x0, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x6000000) 08:10:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x420201, 0x0) fchmodat(r1, &(0x7f0000000100)='./file1\x00', 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:10:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x80, 0x0, 0x0, 0x4d, 0x0, 0xca6, 0x900c4, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0xc, @perf_config_ext={0xcb0, 0x9}, 0x40040, 0x1, 0x2800000, 0x7, 0x7, 0x7, 0x5, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0x1, r1, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:10:07 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x0, 0x40000) r1 = openat(r0, &(0x7f0000000080)='./file1\x00', 0x0, 0x40) read(r1, &(0x7f0000019340)=""/102400, 0x19000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:10:07 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0xa00000000000000) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000001c00)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRESDEC]) 08:10:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/102395, 0x18ffb) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fchmod(r0, 0x10) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:10:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x0, 0x0, 0x9, 0x3, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x1, 0x4, &(0x7f0000000400)=[{&(0x7f0000000180)="a7c34a0eb3f65b358e80b70b73b03d1cacb52cf733eada7e2ca6b9ebe9c90b88fa5549f6293b3cdc3a51ec9e399b3c6d8feee2b274cebccd7dff0278115a", 0x3e, 0x7fffffff}, {&(0x7f00000001c0)="e30343f208927e6cf6342b93e37869eaf2879c", 0x13, 0x81}, {&(0x7f0000000200)="fd7e566ceb8c062eac988795ae98b10cd3dd2fdc36b2e03e7c0bc99eb13a666b4b42b78c503548637aca8ec743b40b64aaa98ac1811b48a7f3fc3c23453dfe5332d5a72e4fa5e4c861c7aa107cc40467cfa0c832aa28ab429b8c7a95f21333d9ef267aafb7f878e8b7ae027d2c4909e5e429571c44b08506092e6b9ffb74dbc53ac99ead6e191cf247e18027c9a305ca8606c36014892aa69003db1383f2f0ffa910b59a703952387e977bb1186b2e4d40df8a55d214d4d30d0f05fc7dc6351eed15dd7d9099f941c109374130815dae51afdb7d36e3c83ace2cdc1d92d3c41e4764f50b3a4f50", 0xe7}, {&(0x7f0000000300)="7629375121bbc46f7c8dc92da4ae9713649aed67b8f02105ca72e9b08b627e8f4cd82e6d7c1568e4e896be12352dbb0b7a758c5570b2e2a407c89fa08b54bc5f5b7f13755634b2648844cf317a0c1ee259baad68e3acbff316bd76043cce6c0b87445533eeabe2a38a1c3a8d7bdccac82426c07ec7034fa0691b569ff3c4241321364f4cbb36946d73615ecf84d8a831451bfb5402d380642a25c64ec74eaf2e70d0323faf73e6ddb04597eddc63e107fdcd6ce21fefc670553a41cb6668634e2e0f69aebc2f97ae64e5f9a6b1f832f8d9183159d3b3f816b2e18f257d58eb2750c95be2", 0xe4, 0x9}], 0x800024, &(0x7f0000000480)={[{'&{@'}, {}], [{@seclabel}, {@subj_user}, {@fowner_lt}, {@subj_type={'subj_type', 0x3d, '%'}}, {@euid_lt={'euid<', 0xee01}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, '&'}}, {@subj_type={'subj_type', 0x3d, '\xb2#B#.-/\xedZ$:@]'}}, {@obj_user={'obj_user', 0x3d, '{,'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000540)={{0x1, 0x1, 0x18, r1, {r2}}, './file1\x00'}) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:10:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, @out_args}, './file1\x00'}) clone3(&(0x7f0000000000)={0x9b201800, 0x0, 0x0, 0x0, {0x22}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) 08:10:07 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) r1 = openat(r0, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000019340)=""/102400, 0x19000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file0\x00', 0x0, &(0x7f0000000180), 0x0) 08:10:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000019340)=""/102400, 0x19000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x10, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r0], 0x2) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000019300)='./file1\x00', 0x0, &(0x7f000001a440), 0x0) BUG: leak checking failed VM DIAGNOSIS: 08:10:08 Registers: info registers vcpu 0 RAX=ffffffff83e6ae20 RBX=0000000000000000 RCX=ffffffff83e52c1c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6b428 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85673e08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e6ae2e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000000000000010c CR3=000000000d674000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004185a95c00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e6ae20 RBX=0000000000000001 RCX=ffffffff83e52c1c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6b428 RBP=ffffed1001130000 RSP=ffff88800898fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85673e08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e6ae2e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005555574c3c58 CR3=000000000d674000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004185a95c00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000