a000000400007800c00030000000000010000000c000400050000000000000008000200f9ffffff0c000400e800000000000000080001000100000008000100030000006c000580080001006574680007000100696200004c00028008000400fcffffff0800040000000000080001000600000008000400d50d0000080004002000000008000200ffffffff0800010009000000080003000000000008000400050000000c00028008000300008000004c000480240007800800010018000000080001001c000000080002001f00000008000200070000000c00078008000100060000000900010073797a31000000000c00078008000200020000002c00038008000300ff03000008000300000001000800020007000000080001000500000008000300050000001c00028008000200e7000000080001000800000008000100a2ffffff6800058008000100657568000c00028008000200000000801c000280080003000100000008000300050000000800040004000000340002010008000100070000000800030003000000080004000500000008000300cc0b00"/438], 0x1bc}, 0x1, 0x0, 0x0, 0x4000005}, 0x4000010) r8 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r8}) [ 1503.506577] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8864 comm=syz-executor.7 09:13:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 1503.549530] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 09:13:50 executing program 6: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:13:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8b"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:13:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:13:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:13:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8b"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:13:51 executing program 6: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1504.279104] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=8985 comm=syz-executor.7 [ 1504.440620] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1518.474605] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:14:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:14:13 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:14:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b9"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:14:13 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:14:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:14:13 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000a00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x808000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000080)={0x93c, 0x0, 0x800, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x924, 0x5, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x24, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2b}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x343}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x100}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xd35}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x9}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16f3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xfffffffc}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xd8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x192}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x44, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xfff}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x30}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x96}, @NL80211_ATTR_CENTER_FREQ2={0x8}]}]}, {0x70, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1c3}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3ba}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1450}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3d7}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1630}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xc8c}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0xf}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x37}]}]}, {0x74, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x341}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7056e19d}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7c}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xf}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1590}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x22}]}]}, {0x90, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x34, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x26}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x101}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0xa4, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x64, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x100}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x4}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x20}]}]}, {0x62c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x158, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xea}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x401}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9c}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x3}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x19}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xaf}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1c0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x401}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8d}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x400}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xb64}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xec, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x438d0caf26e112b0}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x95}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2000}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x234, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xa0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x39}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xff98}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1e}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x81}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x98, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x64, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x4}]}, 0x93c}}, 0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() r4 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r3, r3, 0x7, r2, &(0x7f0000000040)={r4}) 09:14:13 executing program 6: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:14:13 executing program 4: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1526.893541] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1526.900060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9010 comm=syz-executor.7 [ 1526.914918] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9010 comm=syz-executor.7 09:14:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:14:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b9"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:14:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:14:14 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xffffffffffffffff}, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(0xffffffffffffffff, 0x0, 0x800, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x507, 0x6, 0x6, 0x7}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r6, 0x0, r4, 0x0, 0x200f5ef, 0x0) syz_io_uring_setup(0x54e0, &(0x7f0000000280)={0x0, 0x59d8, 0x20, 0x0, 0x18f, 0x0, r2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000300)=0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(0x0, r7, &(0x7f0000000340)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r8, 0x0, 0x0, 0x65, 0x4, 0x1, {0x0, 0x0, r6}}, 0x69d) r9 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r9}) 09:14:14 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1527.410588] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 09:14:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:14:14 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:14:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b9"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) [ 1542.143690] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:14:37 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:14:37 executing program 4: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:14:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:14:37 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = epoll_create(0x1) r3 = getpgrp(r1) prctl$PR_SCHED_CORE(0x3e, 0x4, r3, 0x2, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r2}) dup(r0) 09:14:37 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:14:37 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:14:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b939"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:14:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:14:37 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:14:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:14:37 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r2}) [ 1565.115225] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:15:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b939"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:15:00 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:15:00 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:00 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1}) 09:15:00 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:15:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:15:00 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:00 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) r5 = accept$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000580)=0x1c) r6 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r6, 0x0, r6) read(r6, &(0x7f0000000300)=""/4, 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r7, 0x0, r7) read(r7, &(0x7f0000000300)=""/4, 0x4) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) sendmsg$nl_generic(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000100)="2ff013a6975126bc3a2407566c175b4b8fdaea3b2f3303909dd3946ed6963bc9577d5abe5540f09b28de7f1e3e64584a855dbf9a19dec7d0a08e6d2282b479afefc0ae1cbe077e373b957828a9e6cbb921e96624656f39b5e3c7bda095fc5b9bd14770827e8b084775726d66425d4c6b0b9ee63b5de3fbf0fa63dd343785d9e98dc3c78b85a2b15692c8ae5f2c24876d23d26231f847fd614b6bf3c10b30ab372e79075938a8136a621aefd46e52a125aaef467c1c0108e24ca04536c2f242c6364001bbd881c6d5feb2a2311ca0232b5d33a7c1880395badba20fa8c8681c", 0xdf}, {&(0x7f0000000200)="3ccc00f140ad16d21a1bccc86a2a4e3462e3042835b58947a24f377245236a52636fb93fdc37eaa34815f6a125441e952fda9d8fc2562e7f5cd9f2793062635bcc2ebee21d7a55aabb2d4c8c6c46be580cf70766da9c4f1d8bdb5333387d411f4a81938c0d8a0d1af8e1b59c97674e57aee7dcedffca15a0870b0163fb5c", 0x7e}, {&(0x7f0000000280)="84d3e4449676e3a35758f70eb2f78d51b5f723e991884fd76949aea75ae5cf498b466eb4bbd7a79acf00913129daf39b3a68c517db9fb03905a02b9ae46b359924e4cbd440b0", 0x46}, {&(0x7f0000000300)="59f1b21f027fcb65904d0bb35fb11cf1eadc338debe5129389483b264a324fc6446415c275ecb3ed066f48688257e315b34dd773e0a452af57dbe5888d7097230d7efc2f2bd8e6e2bd39f24df4e49e13efd4d326538bae502e8d2efc35eff015979a9f9ddade3170300c6875902bed7407d99ffba89476bb94a118329810006401df910feb0fabdcd66cc25913ebbe0f5aac31dc0d61a76687b4a822bcd88edcbbbf866e24db8d494f242ea214eeb224c3a37cc65761fe463902a939ef1cf7f4225caf8b367e2676b7d774e16a0b5179ed94c16630514ca7f6e8be126f076d16cda1f92db7a46a", 0xe7}, {&(0x7f0000000000)="3e554a45c91d83794020e9880f", 0xd}], 0x5, &(0x7f00000005c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, r0, r0, r0, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r4, r5]}}, @rights={{0x1c, 0x1, 0x1, [r6, r7, r9]}}], 0x98}, 0x0) r10 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r10}) 09:15:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:15:00 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b939"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:15:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:15:00 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:00 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:15:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:15:16 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000015c0)=[{{&(0x7f0000000100), 0x6e, &(0x7f00000014c0)=[{&(0x7f0000000180)=""/108, 0x6c}, {&(0x7f0000000200)=""/87, 0x57}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/160, 0xa0}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/82, 0x52}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x8, &(0x7f0000001540)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x80}}], 0x1, 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0xe8, 0x0, 0x2, 0x1, 0x0, 0x8, 0x46ae4, 0xd, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x800, 0x6, 0x7, 0x3, 0x8, 0x0, 0xfff7, 0x0, 0x3, 0x0, 0x5}, r1, 0x4, 0xffffffffffffffff, 0x2) r2 = getpid() r3 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r0, &(0x7f0000000040)={r3}) 09:15:16 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:15:16 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:15:16 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3f"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:15:16 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1589.423836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 09:15:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3f"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:15:16 executing program 7: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xcf1c9c352c9a9d1b, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, r0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4b, 0x3f, 0x9, 0x8, 0x0, 0x9, 0x48080, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x201, 0x0, 0x8, 0x4, 0x80000000, 0x8, 0x7, 0x0, 0x1}, r2, 0x4, r1, 0x2) r3 = epoll_create(0x1) r4 = getpid() r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000240)) ptrace$peek(0x3, r4, &(0x7f0000000000)) getpid() kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r1, &(0x7f0000000040)={r3}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x5, 0x8, 0x0, 0xa3, 0x0, 0x9, 0xa, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x4, @perf_bp={&(0x7f0000000080), 0xa}, 0xc0102, 0x9, 0x0, 0x2, 0x1, 0x3, 0x4, 0x0, 0x80, 0x0, 0x800}, 0x0, 0xc, 0xffffffffffffffff, 0x3) [ 1589.471886] perf: interrupt took too long (3210 > 3178), lowering kernel.perf_event_max_sample_rate to 62000 09:15:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:15:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:15:16 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:16 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1589.691601] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 09:15:16 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0xa0002015}) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0xff, 0x0, 0x8, 0x76, 0x0, 0x286c, 0x20000, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x9}, 0x61940, 0x2a2, 0xfffffff9, 0x7, 0x8, 0x8, 0x0, 0x0, 0x6, 0x0, 0x1}, r2, 0x10, 0xffffffffffffffff, 0x0) r5 = getpid() r6 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r5, r5, 0x7, r0, &(0x7f0000000040)={r6}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000002e2f66d89513696c"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe2, 0x14, 0x1, 0x2, 0x0, 0xfffffffffffffff9, 0x1082, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x7, @perf_bp={&(0x7f0000000200), 0x9}, 0x2010, 0xf43e, 0x0, 0x8, 0x40, 0x9b, 0x6, 0x0, 0x20, 0x0, 0x8}, r7, 0x7, r8, 0xb) 09:15:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3f"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:15:16 executing program 4: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1589.955888] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1604.157267] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:15:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = epoll_create(0x1) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4ba, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="21ee1166d07611bfe836e2f025d164d4b353a67c27bd3d9708341c6e4bb7035c262b3b2ae21035f5e1f52bd9177daa4df532876df921232f2bb67df1f8ef4a6b8e0c9b977584399491a1faa0764bd050ba0ff51ab491fae89388db3ae812f3daa1aad36c1f665eb3ac218a3a54990aaf6735d573f432700b01870cb0376aacb3aaf27cdcb99fb9776d341a600108ef3cf57c3c80e449ffc066ea5b210da0cb43906f0b945524", 0xa6, 0x3}, {&(0x7f0000000180)="aa79b6a7091e24875f5e1c9f316ab2b92bb86bab460a8acfb5188f5f10e3fa21d55a337dca4009ad8637a69fcc636964355c7d7853f21f9412dec47fd72a9dd85ba89d878583db44da31dc942fa726260821ee81dde1ac8e52dbbb491a07ba7c3d8bdbb67ea44e7d549daa2a37d7c9153339e0bcc78dc1923d447e88f8cc82f6ab1b58a91434a13da980664fafe348b8b41a16b147f1c7e4d384ce91a4085fe322837b0e0ff6d76fded3769261e135c4acc794217b1bfb4b861e1fb18258ce19ff9ae09efaa90ba9532942cd2cdf5955e0ce9900f2fb", 0xd6, 0x3}, {&(0x7f0000000280)="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", 0xfd, 0x3ff}], 0x2100000, &(0x7f0000000500)=ANY=[@ANYBLOB='mode=00000000000000000000010,huge=advise,fowner=', @ANYRESDEC, @ANYBLOB="2c00e087af58cb8906048fd3ac2d67f973aa10d5bf1fcf2cf4b507d4d85b0e299412e91421c8f13c2b1ae528f7f4aa01000000ffdf29bb7c45037c4e8efd20a07ffb021737f55a477d5c8e9b97aab0a7b64307075fe847c15162cd3bd9040a231ab9a4d847dc1b1a6ce693d1a1c08157e8afd8eb837f3d5f8e3a7d47b17dd70000000000"]) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r2, &(0x7f0000000040)={r1, r3, 0x1}) 09:15:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:15:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:15:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8b"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:15:39 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:15:39 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:39 executing program 4: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1612.627862] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 09:15:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8b"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:15:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:15:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:15:39 executing program 7: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:39 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:15:39 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1612.961949] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 09:15:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8b"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:15:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1613.098996] perf: interrupt took too long (4031 > 4012), lowering kernel.perf_event_max_sample_rate to 49000 09:15:40 executing program 4: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1613.282344] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1627.442858] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:16:02 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:16:02 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b9"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:16:02 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:16:02 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:02 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x0, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:02 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1636.056597] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 09:16:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b9"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:16:03 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:03 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:03 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:03 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x0, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:16:03 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1636.376542] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 09:16:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b9"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:16:03 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:16:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1636.613017] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1651.058752] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:16:26 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:16:26 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:26 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:26 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b939"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:16:26 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:26 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x0, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1659.443569] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 09:16:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b939"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 1659.638962] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 09:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:16:26 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:26 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:16:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b939"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:16:26 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 1659.892430] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1659.897656] perf: interrupt took too long (5058 > 5038), lowering kernel.perf_event_max_sample_rate to 39000 [ 1673.763182] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:16:49 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:49 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:16:49 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:16:49 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:16:49 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x0) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:16:49 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:16:49 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:49 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:16:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:16:49 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x0) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:16:49 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:16:49 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1696.222470] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:17:10 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:10 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:10 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x0) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:10 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:10 executing program 0: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:10 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:10 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:17:10 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:11 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:11 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:11 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xffffffffffffffff}, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(0xffffffffffffffff, 0x0, 0x800, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x507, 0x6, 0x6, 0x7}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r6, 0x0, r4, 0x0, 0x200f5ef, 0x0) syz_io_uring_setup(0x54e0, &(0x7f0000000280)={0x0, 0x59d8, 0x20, 0x0, 0x18f, 0x0, r2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000300)=0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(0x0, r7, &(0x7f0000000340)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r8, 0x0, 0x0, 0x65, 0x4, 0x1, {0x0, 0x0, r6}}, 0x69d) r9 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r9}) 09:17:11 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(0xffffffffffffffff, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:11 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:11 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:17:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:11 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1718.529479] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:17:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:17:33 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:33 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:33 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(0xffffffffffffffff, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xffffffffffffffff}, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(0xffffffffffffffff, 0x0, 0x800, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x507, 0x6, 0x6, 0x7}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r6, 0x0, r4, 0x0, 0x200f5ef, 0x0) syz_io_uring_setup(0x54e0, &(0x7f0000000280)={0x0, 0x59d8, 0x20, 0x0, 0x18f, 0x0, r2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000300)=0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(0x0, r7, &(0x7f0000000340)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r8, 0x0, 0x0, 0x65, 0x4, 0x1, {0x0, 0x0, r6}}, 0x69d) r9 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r9}) 09:17:33 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:33 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1741.133963] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:17:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:17:56 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b9"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:17:56 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:56 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(0xffffffffffffffff, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:17:56 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:56 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1749.508254] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 09:17:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b9"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:17:56 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:56 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:56 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:56 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8b"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) [ 1749.826201] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1749.847552] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:17:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:17:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8b"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:17:56 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:56 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:56 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:56 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:57 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:57 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x0, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:57 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1750.128147] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:17:57 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:57 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:57 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:17:57 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:57 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x0, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:57 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:17:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1764.732934] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:18:20 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:18:20 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:20 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x0, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:20 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:18:20 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(0x0, r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3f"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:18:20 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:20 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 1773.299303] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 09:18:20 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1787.305807] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:18:42 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:18:42 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:42 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(0x0, r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:42 executing program 0: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:42 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:18:42 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:18:42 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:42 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:42 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:42 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:18:42 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:18:42 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:42 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:18:42 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(0x0, r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 1808.320284] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:19:05 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:05 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(0x0, r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:05 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(0x0, r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:05 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:05 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:05 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:05 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:05 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:19:05 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:05 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:05 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:05 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:05 executing program 0: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r2, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:05 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:05 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:05 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:19:05 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1833.346110] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:19:28 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:19:28 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:28 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:28 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:28 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:28 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:28 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:28 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x0, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:28 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:28 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:28 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:28 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:19:28 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 1855.718372] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:19:50 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:50 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:50 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:19:50 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:50 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:50 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x0, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:19:50 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, 0x0, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:50 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x0, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:50 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @loopback}}}, 0x88) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:51 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, 0x0, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:51 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:51 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:51 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:51 executing program 0: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:51 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x0, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:19:51 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:19:51 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 1878.378361] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:20:13 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:13 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000008c0)=0x200) r4 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xf4, 0x8, &(0x7f0000000740)=[{&(0x7f0000000180)="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", 0xfb, 0x3f}, {&(0x7f0000000280)="b5ca0d8d89b88204bd546299d7c0ce8cdfb7e8cb455c5b0c3e80522f6143bb4f024058a3c4c3e7da397cbebfb91a5cddc3cf7652ee97064d2f76", 0x3a, 0xffffffff}, {&(0x7f00000002c0)="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", 0xfe, 0x101}, {&(0x7f00000003c0)="979d89f65f19bfd5228af7bc9941f50e1846da465b5032ea0e44a412372a78c1bc62ae4ed2ad708c7e0be7650df3d46785068e01aea7fdf2a94f51a50e69a010c28d57ab15313e04a2d303279da55606d1d782e0ff01da60a68be9886a5bcfe71225b4844c1ac9ec727b0e5c5af64f1883ee1ae82309eff18d7f00cc80dfe689b17896a17bdb8955e2c9f7e14a8011e75dd98c012eee39717d", 0x99, 0x2}, {&(0x7f0000000480)="d577e2e88a639ac99152c69662e6174a8c5b6ab55911a64d907f75cbe4d977b08eb050df79b42265b380203ea0df25f42b1567e7fa108bd142cc066bd864aea59da636f56fb2fb34f8b598976b9b5977e6f7ce1eee94c3f2cf9b31e9dc7dc726a0da", 0x62, 0x1}, {&(0x7f0000000500)="a51548dd49806e34f262a23014e3cd62ab4379c0569558a8f007a8d33a081bb654a0001f75abcaf01da5699ed4edc92f42cecf3f467092273f21ebdf7276744498e657f33de03cb9080ddfaafda33cf7c88ea7de34c2b9b132e4ed5b676e2a6b2ce36aac08c479a0e60c29d3aca109ec968cfca929453076", 0x78, 0x198e7ce1}, {&(0x7f0000000580)="74201b22d48a007895da67368d9e27f7381421db1efd0a022d1cca4ee5a49702d8b628904401b056ebef742540ec6a6006926df7fac80e4a28e6364d60dcb1815a2f2dda149665eb49ec504085752bb95b0365ab8d6c00fc5f278e2fdcda9c9203906481ab1dc9b78fedf41063e75abc3820f02e06aaf6eab03fe1ac4b57379a899d0cbf3d316f9050da4a579b5a3e0631f58f725a52a00ce056e31686ea0f9f7e196a020e6f2568b218eb4e98c261e7c3373d4194298f54fc661d6209e7bafbc16d71a695103e7e15a24d92fd2d8e1f7c12d677d943fe6df86ad2c6c7ee8427e9d442da008b793f3d8d527c6e103f1a9424c980dc4e35", 0xf7, 0x10001}, {&(0x7f0000000680)="f07d91cb3705c7150e7de46421ac1cfa611531ddb02b3515a9d4de090991c5c59c8f1bf2b3a1de0903077c70dace2d015da79d3ab5f886fc71b5dce7a04f48c45656aaf0e614b0325318d7c3cc60a9326040b9de53aa38e0c7d34232097d5776396cebc284196e2eeb99980b815e2ddb1464f23af98d05531a2ab686632a7dbca34f6a7c8970604ffb578d712bc1231c74004e9b708e10e844", 0x99, 0x40}], 0x200020, &(0x7f0000000800)={[{@usrquota}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@audit}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@measure}, {@fsname={'fsname', 0x3d, '-'}}]}) openat(r4, &(0x7f0000000880)='./file0\x00', 0x40040, 0x1a2) r5 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r5}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000080)=""/70, &(0x7f0000000000)=0x46) 09:20:13 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:20:13 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:13 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x0) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:13 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:13 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, 0x0, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:13 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:13 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:13 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:13 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:13 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:13 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x0) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:13 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 1900.866098] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:20:36 executing program 3: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:20:36 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:20:36 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:36 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x0) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:36 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:36 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:36 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:36 executing program 3: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:36 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:36 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000000}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r2}) 09:20:36 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(0xffffffffffffffff, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:20:36 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:36 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r2, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:36 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r2, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:36 executing program 3: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1923.868224] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:20:59 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:20:59 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240), 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x24, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) 09:20:59 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:59 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(0xffffffffffffffff, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:20:59 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:20:59 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1945.471556] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:21:20 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:21:20 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:21:20 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:20 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(0xffffffffffffffff, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:20 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240), 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:20 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:21:20 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:21:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 1) [ 1953.447591] FAULT_INJECTION: forcing a failure. [ 1953.447591] name failslab, interval 1, probability 0, space 0, times 1 09:21:20 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1953.450019] CPU: 1 PID: 12687 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 1953.450955] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1953.452009] Call Trace: [ 1953.452396] dump_stack+0x107/0x167 [ 1953.452910] should_fail.cold+0x5/0xa [ 1953.453446] ? mb_cache_entry_create+0xbf/0x890 [ 1953.454103] should_failslab+0x5/0x20 [ 1953.454644] kmem_cache_alloc+0x5b/0x360 [ 1953.455204] mb_cache_entry_create+0xbf/0x890 [ 1953.455709] ext4_xattr_get+0x563/0xa00 [ 1953.456143] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1953.456667] ? xattr_resolve_name+0x26e/0x3e0 [ 1953.457153] ? ext4_xattr_security_set+0x40/0x40 [ 1953.457679] __vfs_getxattr+0xe3/0x150 [ 1953.458108] ? __vfs_setxattr+0x180/0x180 [ 1953.458561] ? lock_acquire+0x197/0x490 [ 1953.459009] ? ext4_file_write_iter+0x377/0x18e0 [ 1953.459533] cap_inode_need_killpriv+0x3c/0x60 [ 1953.460053] security_inode_need_killpriv+0x46/0xa0 [ 1953.460625] file_remove_privs+0x30f/0x540 [ 1953.461096] ? init_once+0x230/0x230 [ 1953.461557] ? generic_write_checks+0x2ad/0x390 [ 1953.462077] ? generic_write_check_limits+0x2a0/0x2a0 [ 1953.462666] ? down_write+0xe0/0x160 [ 1953.463095] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1953.463687] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1953.464319] file_modified+0x14/0xa0 [ 1953.464765] ext4_file_write_iter+0x906/0x18e0 [ 1953.465308] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1953.465827] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1953.466434] ? SOFTIRQ_verbose+0x10/0x10 [ 1953.466917] new_sync_write+0x42c/0x660 [ 1953.467380] ? new_sync_read+0x6f0/0x6f0 [ 1953.467871] ? ksys_write+0x12d/0x260 [ 1953.468317] ? lock_release+0x6b0/0x6b0 [ 1953.468795] ? selinux_file_permission+0x36/0x510 [ 1953.469367] ? __fget_files+0x296/0x480 [ 1953.469861] vfs_write+0x747/0xa30 [ 1953.470282] ksys_write+0x12d/0x260 [ 1953.470712] ? __ia32_sys_read+0xb0/0xb0 [ 1953.471186] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1953.471821] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1953.472419] do_syscall_64+0x33/0x40 [ 1953.472858] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1953.473457] RIP: 0033:0x7f29c20d1b19 [ 1953.473919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1953.476076] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1953.476964] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 1953.477819] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 1953.478654] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1953.479476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1953.480301] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:21:20 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240), 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:20 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:21:20 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:21:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 2) 09:21:20 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:20 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:20 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240), 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:20 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:21:20 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1953.802373] FAULT_INJECTION: forcing a failure. [ 1953.802373] name failslab, interval 1, probability 0, space 0, times 0 [ 1953.804343] CPU: 1 PID: 12709 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 1953.805246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1953.806385] Call Trace: [ 1953.806767] dump_stack+0x107/0x167 [ 1953.807256] should_fail.cold+0x5/0xa [ 1953.807774] ? create_object.isra.0+0x3a/0xa20 [ 1953.808392] should_failslab+0x5/0x20 [ 1953.808912] kmem_cache_alloc+0x5b/0x360 [ 1953.809453] create_object.isra.0+0x3a/0xa20 [ 1953.810076] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1953.810727] kmem_cache_alloc+0x159/0x360 [ 1953.811270] mb_cache_entry_create+0xbf/0x890 [ 1953.812072] ext4_xattr_get+0x563/0xa00 [ 1953.812611] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1953.813220] ? xattr_resolve_name+0x26e/0x3e0 [ 1953.813917] ? ext4_xattr_security_set+0x40/0x40 [ 1953.814651] __vfs_getxattr+0xe3/0x150 [ 1953.815137] ? __vfs_setxattr+0x180/0x180 [ 1953.815682] ? lock_acquire+0x197/0x490 [ 1953.816242] ? ext4_file_write_iter+0x377/0x18e0 [ 1953.816906] cap_inode_need_killpriv+0x3c/0x60 [ 1953.817580] security_inode_need_killpriv+0x46/0xa0 [ 1953.818285] file_remove_privs+0x30f/0x540 [ 1953.818930] ? init_once+0x230/0x230 [ 1953.819505] ? generic_write_checks+0x2ad/0x390 [ 1953.820174] ? generic_write_check_limits+0x2a0/0x2a0 [ 1953.821086] ? down_write+0xe0/0x160 [ 1953.821986] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1953.822829] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1953.823720] file_modified+0x14/0xa0 [ 1953.824353] ext4_file_write_iter+0x906/0x18e0 [ 1953.825182] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1953.826007] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1953.826921] ? SOFTIRQ_verbose+0x10/0x10 [ 1953.827824] new_sync_write+0x42c/0x660 [ 1953.828614] ? new_sync_read+0x6f0/0x6f0 [ 1953.829317] ? ksys_write+0x12d/0x260 [ 1953.829960] ? lock_release+0x6b0/0x6b0 [ 1953.830639] ? selinux_file_permission+0x36/0x510 [ 1953.831438] ? __fget_files+0x296/0x480 [ 1953.832120] vfs_write+0x747/0xa30 [ 1953.832712] ksys_write+0x12d/0x260 [ 1953.833338] ? __ia32_sys_read+0xb0/0xb0 [ 1953.834052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1953.834982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1953.835869] do_syscall_64+0x33/0x40 [ 1953.836549] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1953.837593] RIP: 0033:0x7f29c20d1b19 [ 1953.838317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1953.841422] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1953.842799] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 1953.844013] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 1953.845376] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1953.846792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1953.847978] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:21:20 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:21:20 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1967.809499] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:21:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:21:50 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:50 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:50 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:21:50 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240), 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:21:50 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:21:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 1) dup3(0xffffffffffffffff, r1, 0x0) 09:21:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 3) [ 1983.291702] FAULT_INJECTION: forcing a failure. [ 1983.291702] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1983.293409] CPU: 1 PID: 12845 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 1983.294554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1983.295906] Call Trace: [ 1983.296262] dump_stack+0x107/0x167 [ 1983.296762] should_fail.cold+0x5/0xa [ 1983.297298] _copy_from_user+0x2e/0x1b0 [ 1983.297860] __copy_msghdr_from_user+0x91/0x4b0 [ 1983.298525] ? __ia32_sys_shutdown+0x80/0x80 [ 1983.299126] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1983.299848] ? __lock_acquire+0xbb1/0x5b00 [ 1983.300430] sendmsg_copy_msghdr+0xa1/0x160 [ 1983.301034] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1983.301658] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1983.302394] ? SOFTIRQ_verbose+0x10/0x10 [ 1983.302941] ? lock_downgrade+0x6d0/0x6d0 [ 1983.303501] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1983.304506] ? SOFTIRQ_verbose+0x10/0x10 [ 1983.305116] ___sys_sendmsg+0xc6/0x170 [ 1983.305662] ? sendmsg_copy_msghdr+0x160/0x160 [ 1983.306540] ? __fget_files+0x26d/0x480 [ 1983.307148] ? lock_downgrade+0x6d0/0x6d0 [ 1983.307757] ? find_held_lock+0x2c/0x110 [ 1983.308328] ? __fget_files+0x296/0x480 [ 1983.308932] ? __fget_light+0xea/0x290 [ 1983.309488] __sys_sendmsg+0xe5/0x1b0 [ 1983.310050] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1983.310666] ? rcu_read_lock_any_held+0x75/0xa0 [ 1983.311381] ? fput_many+0x2f/0x1a0 [ 1983.311875] ? ksys_write+0x1a9/0x260 [ 1983.312589] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1983.313551] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1983.314335] ? trace_hardirqs_on+0x5b/0x180 [ 1983.315033] do_syscall_64+0x33/0x40 [ 1983.315670] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1983.316522] RIP: 0033:0x7fe21efd1b19 [ 1983.317087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1983.320065] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1983.321272] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 1983.322466] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 1983.323565] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1983.324655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1983.325753] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 09:21:50 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1983.359192] FAULT_INJECTION: forcing a failure. [ 1983.359192] name failslab, interval 1, probability 0, space 0, times 0 [ 1983.360951] CPU: 1 PID: 12849 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 1983.361857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1983.363298] Call Trace: [ 1983.363676] dump_stack+0x107/0x167 [ 1983.364254] should_fail.cold+0x5/0xa [ 1983.364808] ? mb_cache_entry_create+0xbf/0x890 [ 1983.365561] should_failslab+0x5/0x20 [ 1983.366145] kmem_cache_alloc+0x5b/0x360 [ 1983.366736] mb_cache_entry_create+0xbf/0x890 [ 1983.367380] ext4_xattr_get+0x563/0xa00 [ 1983.367942] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1983.368567] ? xattr_resolve_name+0x26e/0x3e0 [ 1983.369174] ? ext4_xattr_security_set+0x40/0x40 [ 1983.369804] __vfs_getxattr+0xe3/0x150 [ 1983.370342] ? __vfs_setxattr+0x180/0x180 [ 1983.370918] ? igrab+0xc0/0xc0 [ 1983.371370] ? ext4_xattr_security_set+0x40/0x40 [ 1983.372043] cap_inode_need_killpriv+0x3c/0x60 [ 1983.372659] security_inode_need_killpriv+0x46/0xa0 [ 1983.373334] notify_change+0x886/0x1080 [ 1983.373924] file_remove_privs+0x386/0x540 [ 1983.374535] ? init_once+0x230/0x230 [ 1983.375114] ? generic_write_checks+0x2ad/0x390 [ 1983.375826] ? down_write+0xe0/0x160 [ 1983.376356] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1983.377093] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1983.377823] file_modified+0x14/0xa0 [ 1983.378384] ext4_file_write_iter+0x906/0x18e0 [ 1983.379043] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1983.379720] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1983.380557] ? SOFTIRQ_verbose+0x10/0x10 [ 1983.381138] new_sync_write+0x42c/0x660 [ 1983.381705] ? new_sync_read+0x6f0/0x6f0 [ 1983.382272] ? ksys_write+0x12d/0x260 [ 1983.382797] ? lock_release+0x6b0/0x6b0 [ 1983.383376] ? selinux_file_permission+0x36/0x510 [ 1983.384070] ? __fget_files+0x296/0x480 [ 1983.384692] vfs_write+0x747/0xa30 [ 1983.385228] ksys_write+0x12d/0x260 [ 1983.385743] ? __ia32_sys_read+0xb0/0xb0 [ 1983.386356] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1983.387076] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1983.387785] do_syscall_64+0x33/0x40 [ 1983.388320] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1983.389091] RIP: 0033:0x7f29c20d1b19 [ 1983.389594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1983.392099] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1983.393124] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 1983.394122] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 1983.395112] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 1983.396065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1983.397302] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:21:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1996.928324] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:22:11 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x5) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:11 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 4) 09:22:11 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240), 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 2) dup3(0xffffffffffffffff, r1, 0x0) 09:22:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:22:11 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2004.949079] FAULT_INJECTION: forcing a failure. [ 2004.949079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2004.951754] CPU: 1 PID: 12978 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2004.952748] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2004.953927] Call Trace: [ 2004.954324] dump_stack+0x107/0x167 [ 2004.954838] should_fail.cold+0x5/0xa [ 2004.955390] _copy_from_user+0x2e/0x1b0 [ 2004.955970] iovec_from_user+0x141/0x400 [ 2004.956564] __import_iovec+0x67/0x590 [ 2004.957123] ? __ia32_sys_shutdown+0x80/0x80 [ 2004.957742] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2004.958551] import_iovec+0x83/0xb0 [ 2004.959078] sendmsg_copy_msghdr+0x131/0x160 [ 2004.959736] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2004.960390] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2004.961139] ? lock_downgrade+0x6d0/0x6d0 [ 2004.961764] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2004.962539] ? SOFTIRQ_verbose+0x10/0x10 [ 2004.963130] ___sys_sendmsg+0xc6/0x170 [ 2004.963716] ? sendmsg_copy_msghdr+0x160/0x160 [ 2004.964370] ? __fget_files+0x26d/0x480 [ 2004.964946] ? lock_downgrade+0x6d0/0x6d0 [ 2004.965530] ? find_held_lock+0x2c/0x110 [ 2004.966116] ? __fget_files+0x296/0x480 [ 2004.966725] ? __fget_light+0xea/0x290 [ 2004.967291] __sys_sendmsg+0xe5/0x1b0 [ 2004.967832] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2004.968449] ? rcu_read_lock_any_held+0x75/0xa0 [ 2004.969141] ? fput_many+0x2f/0x1a0 [ 2004.969642] ? ksys_write+0x1a9/0x260 [ 2004.970221] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2004.970990] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2004.971717] ? trace_hardirqs_on+0x5b/0x180 [ 2004.972320] do_syscall_64+0x33/0x40 [ 2004.972839] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2004.973575] RIP: 0033:0x7fe21efd1b19 [ 2004.974098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2004.976705] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2004.977818] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2004.978873] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2004.979898] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2004.980910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2004.981940] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 [ 2005.060392] FAULT_INJECTION: forcing a failure. [ 2005.060392] name failslab, interval 1, probability 0, space 0, times 0 [ 2005.061993] CPU: 0 PID: 13077 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2005.062925] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2005.064039] Call Trace: [ 2005.064405] dump_stack+0x107/0x167 [ 2005.064902] should_fail.cold+0x5/0xa [ 2005.065424] ? create_object.isra.0+0x3a/0xa20 [ 2005.066043] should_failslab+0x5/0x20 [ 2005.066620] kmem_cache_alloc+0x5b/0x360 [ 2005.067251] create_object.isra.0+0x3a/0xa20 [ 2005.067936] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2005.068633] kmem_cache_alloc+0x159/0x360 [ 2005.069194] mb_cache_entry_create+0xbf/0x890 [ 2005.069805] ext4_xattr_get+0x563/0xa00 [ 2005.070379] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2005.070970] ? xattr_resolve_name+0x26e/0x3e0 [ 2005.071565] ? ext4_xattr_security_set+0x40/0x40 [ 2005.072175] __vfs_getxattr+0xe3/0x150 [ 2005.072680] ? __vfs_setxattr+0x180/0x180 [ 2005.073248] ? igrab+0xc0/0xc0 [ 2005.073689] ? ext4_xattr_security_set+0x40/0x40 [ 2005.074355] cap_inode_need_killpriv+0x3c/0x60 [ 2005.074979] security_inode_need_killpriv+0x46/0xa0 [ 2005.075682] notify_change+0x886/0x1080 [ 2005.076285] file_remove_privs+0x386/0x540 [ 2005.076903] ? init_once+0x230/0x230 [ 2005.077412] ? generic_write_checks+0x2ad/0x390 [ 2005.078055] ? down_write+0xe0/0x160 [ 2005.078569] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2005.079231] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2005.079921] file_modified+0x14/0xa0 [ 2005.080432] ext4_file_write_iter+0x906/0x18e0 [ 2005.081092] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2005.081748] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2005.082510] ? SOFTIRQ_verbose+0x10/0x10 [ 2005.083101] new_sync_write+0x42c/0x660 [ 2005.083658] ? new_sync_read+0x6f0/0x6f0 [ 2005.084222] ? ksys_write+0x12d/0x260 [ 2005.084753] ? lock_release+0x6b0/0x6b0 [ 2005.085333] ? selinux_file_permission+0x36/0x510 [ 2005.086051] ? __fget_files+0x296/0x480 [ 2005.086658] vfs_write+0x747/0xa30 [ 2005.087157] ksys_write+0x12d/0x260 [ 2005.087669] ? __ia32_sys_read+0xb0/0xb0 [ 2005.088241] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2005.088965] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2005.089656] do_syscall_64+0x33/0x40 09:22:12 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 2005.090205] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2005.091123] RIP: 0033:0x7f29c20d1b19 [ 2005.091645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2005.094192] RSP: 002b:00007f29bf626188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2005.095247] RAX: ffffffffffffffda RBX: 00007f29c21e5020 RCX: 00007f29c20d1b19 [ 2005.096238] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 09:22:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 3) dup3(0xffffffffffffffff, r1, 0x0) 09:22:12 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2005.097221] RBP: 00007f29bf6261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2005.098361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2005.099347] R13: 00007ffe4dc230af R14: 00007f29bf626300 R15: 0000000000022000 09:22:12 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={0x0, 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:12 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 5) 09:22:12 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2005.308943] FAULT_INJECTION: forcing a failure. [ 2005.308943] name failslab, interval 1, probability 0, space 0, times 0 [ 2005.310643] CPU: 1 PID: 13092 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2005.311616] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2005.312838] Call Trace: [ 2005.313221] dump_stack+0x107/0x167 [ 2005.313733] should_fail.cold+0x5/0xa [ 2005.314300] ? __alloc_skb+0x6d/0x620 [ 2005.314841] should_failslab+0x5/0x20 [ 2005.315374] kmem_cache_alloc_node+0x55/0x370 [ 2005.316047] __alloc_skb+0x6d/0x620 [ 2005.316576] netlink_sendmsg+0x98e/0xdf0 [ 2005.317164] ? netlink_unicast+0x7f0/0x7f0 [ 2005.317763] ? netlink_unicast+0x7f0/0x7f0 [ 2005.318413] sock_sendmsg+0x154/0x190 [ 2005.318949] ____sys_sendmsg+0x70d/0x870 [ 2005.319520] ? kernel_sendmsg+0x50/0x50 [ 2005.320077] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2005.320706] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2005.321401] ? lock_downgrade+0x6d0/0x6d0 [ 2005.321978] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2005.322721] ? SOFTIRQ_verbose+0x10/0x10 [ 2005.323304] ___sys_sendmsg+0xf3/0x170 [ 2005.323880] ? sendmsg_copy_msghdr+0x160/0x160 [ 2005.324562] ? lock_downgrade+0x6d0/0x6d0 [ 2005.325188] ? find_held_lock+0x2c/0x110 [ 2005.325752] ? __fget_files+0x296/0x480 [ 2005.326348] ? __fget_light+0xea/0x290 [ 2005.326895] __sys_sendmsg+0xe5/0x1b0 [ 2005.327405] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2005.328025] ? rcu_read_lock_any_held+0x75/0xa0 [ 2005.328680] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2005.329436] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2005.330150] ? trace_hardirqs_on+0x5b/0x180 [ 2005.330803] do_syscall_64+0x33/0x40 [ 2005.331358] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2005.332063] RIP: 0033:0x7fe21efd1b19 [ 2005.332586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2005.335100] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2005.336161] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2005.337147] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2005.338198] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2005.339202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2005.340177] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 09:22:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 4) dup3(0xffffffffffffffff, r1, 0x0) [ 2005.472868] FAULT_INJECTION: forcing a failure. [ 2005.472868] name failslab, interval 1, probability 0, space 0, times 0 [ 2005.475022] CPU: 1 PID: 13147 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2005.475976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2005.477133] Call Trace: [ 2005.477509] dump_stack+0x107/0x167 [ 2005.478000] should_fail.cold+0x5/0xa [ 2005.478557] ? jbd2__journal_start+0x190/0x890 [ 2005.479190] should_failslab+0x5/0x20 09:22:12 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2005.479720] kmem_cache_alloc+0x5b/0x360 [ 2005.480472] ? _down_write_nest_lock+0x160/0x160 [ 2005.481098] jbd2__journal_start+0x190/0x890 [ 2005.481685] __ext4_journal_start_sb+0x214/0x430 [ 2005.482344] ext4_xattr_set+0x23a/0x340 [ 2005.482918] ? ext4_xattr_set_credits+0x200/0x200 [ 2005.483594] ? _down_write_nest_lock+0x160/0x160 [ 2005.484283] ? xattr_resolve_name+0x26e/0x3e0 [ 2005.484892] ? ext4_initxattrs+0x120/0x120 [ 2005.485497] __vfs_removexattr+0xf9/0x170 [ 2005.486054] ? __vfs_getxattr+0x150/0x150 [ 2005.486648] cap_inode_killpriv+0x19/0x50 [ 2005.487223] security_inode_killpriv+0x46/0xa0 [ 2005.487862] setattr_prepare+0x19f/0x7e0 [ 2005.488433] ext4_setattr+0x1a8/0x22c0 [ 2005.488957] ? igrab+0xc0/0xc0 [ 2005.489396] ? ext4_xattr_security_set+0x40/0x40 [ 2005.490072] ? ext4_journalled_write_end+0x1240/0x1240 [ 2005.490811] notify_change+0xba2/0x1080 [ 2005.491370] file_remove_privs+0x386/0x540 [ 2005.491936] ? init_once+0x230/0x230 [ 2005.492466] ? generic_write_checks+0x2ad/0x390 [ 2005.493113] ? down_write+0xe0/0x160 [ 2005.493616] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2005.494333] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2005.495056] file_modified+0x14/0xa0 [ 2005.495595] ext4_file_write_iter+0x906/0x18e0 [ 2005.496239] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2005.496889] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2005.497587] ? SOFTIRQ_verbose+0x10/0x10 [ 2005.498152] new_sync_write+0x42c/0x660 [ 2005.498736] ? new_sync_read+0x6f0/0x6f0 [ 2005.499308] ? ksys_write+0x12d/0x260 [ 2005.499840] ? lock_release+0x6b0/0x6b0 [ 2005.500378] ? selinux_file_permission+0x36/0x510 [ 2005.501035] ? __fget_files+0x296/0x480 [ 2005.501585] vfs_write+0x747/0xa30 [ 2005.502080] ksys_write+0x12d/0x260 [ 2005.502606] ? __ia32_sys_read+0xb0/0xb0 [ 2005.503179] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2005.503919] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2005.504647] do_syscall_64+0x33/0x40 [ 2005.505171] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2005.505914] RIP: 0033:0x7f29c20d1b19 [ 2005.506522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2005.509100] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2005.510180] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2005.511178] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2005.512164] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2005.513137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2005.514114] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:22:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:12 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={0x0, 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:12 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2005.732240] FAULT_INJECTION: forcing a failure. [ 2005.732240] name failslab, interval 1, probability 0, space 0, times 0 [ 2005.734345] CPU: 1 PID: 13213 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2005.735309] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2005.736439] Call Trace: [ 2005.736818] dump_stack+0x107/0x167 [ 2005.737304] should_fail.cold+0x5/0xa [ 2005.737812] ? create_object.isra.0+0x3a/0xa20 [ 2005.738450] should_failslab+0x5/0x20 [ 2005.738977] kmem_cache_alloc+0x5b/0x360 [ 2005.739544] create_object.isra.0+0x3a/0xa20 [ 2005.740301] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2005.741048] kmem_cache_alloc_node+0x169/0x370 [ 2005.741775] __alloc_skb+0x6d/0x620 [ 2005.742285] netlink_sendmsg+0x98e/0xdf0 [ 2005.742824] ? netlink_unicast+0x7f0/0x7f0 [ 2005.743400] ? netlink_unicast+0x7f0/0x7f0 [ 2005.743946] sock_sendmsg+0x154/0x190 [ 2005.744471] ____sys_sendmsg+0x70d/0x870 [ 2005.745055] ? kernel_sendmsg+0x50/0x50 [ 2005.745610] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2005.746314] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2005.747052] ? lock_downgrade+0x6d0/0x6d0 [ 2005.747808] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2005.748731] ? SOFTIRQ_verbose+0x10/0x10 [ 2005.749286] ___sys_sendmsg+0xf3/0x170 [ 2005.749801] ? sendmsg_copy_msghdr+0x160/0x160 [ 2005.750424] ? lock_downgrade+0x6d0/0x6d0 [ 2005.750971] ? find_held_lock+0x2c/0x110 [ 2005.751537] ? __fget_files+0x296/0x480 [ 2005.752096] ? __fget_light+0xea/0x290 [ 2005.752623] __sys_sendmsg+0xe5/0x1b0 [ 2005.753168] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2005.753755] ? rcu_read_lock_any_held+0x75/0xa0 [ 2005.754489] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2005.755282] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2005.756128] ? trace_hardirqs_on+0x5b/0x180 [ 2005.756902] do_syscall_64+0x33/0x40 [ 2005.757419] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2005.758129] RIP: 0033:0x7fe21efd1b19 [ 2005.758674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2005.761322] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2005.762380] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2005.763375] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2005.764448] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2005.765457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2005.766494] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 [ 2019.275872] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:22:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 6) 09:22:34 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:34 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={0x0, 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:22:34 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:34 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 5) dup3(0xffffffffffffffff, r1, 0x0) [ 2027.203177] FAULT_INJECTION: forcing a failure. [ 2027.203177] name failslab, interval 1, probability 0, space 0, times 0 [ 2027.205122] CPU: 1 PID: 13240 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2027.206149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2027.207255] Call Trace: [ 2027.207607] dump_stack+0x107/0x167 [ 2027.208160] should_fail.cold+0x5/0xa [ 2027.208707] should_failslab+0x5/0x20 [ 2027.209240] __kmalloc_node_track_caller+0x74/0x3f0 [ 2027.209968] ? netlink_sendmsg+0x98e/0xdf0 [ 2027.210619] __alloc_skb+0xb1/0x620 [ 2027.211134] netlink_sendmsg+0x98e/0xdf0 [ 2027.211764] ? netlink_unicast+0x7f0/0x7f0 [ 2027.212355] ? netlink_unicast+0x7f0/0x7f0 [ 2027.212943] sock_sendmsg+0x154/0x190 [ 2027.213522] ____sys_sendmsg+0x70d/0x870 [ 2027.214095] ? kernel_sendmsg+0x50/0x50 [ 2027.214687] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2027.215357] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2027.216076] ? lock_downgrade+0x6d0/0x6d0 [ 2027.216695] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2027.217477] ? SOFTIRQ_verbose+0x10/0x10 [ 2027.218051] ___sys_sendmsg+0xf3/0x170 [ 2027.222701] ? sendmsg_copy_msghdr+0x160/0x160 [ 2027.223266] ? lock_downgrade+0x6d0/0x6d0 [ 2027.223753] ? find_held_lock+0x2c/0x110 [ 2027.224205] ? __fget_files+0x296/0x480 [ 2027.224656] ? __fget_light+0xea/0x290 [ 2027.225089] __sys_sendmsg+0xe5/0x1b0 [ 2027.225514] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2027.225998] ? rcu_read_lock_any_held+0x75/0xa0 [ 2027.226528] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2027.227168] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2027.227730] ? trace_hardirqs_on+0x5b/0x180 [ 2027.228209] do_syscall_64+0x33/0x40 [ 2027.228628] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2027.229233] RIP: 0033:0x7fe21efd1b19 [ 2027.229670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2027.232032] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2027.233126] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2027.234076] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2027.235150] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2027.236133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2027.237158] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 [ 2027.246030] FAULT_INJECTION: forcing a failure. [ 2027.246030] name failslab, interval 1, probability 0, space 0, times 0 [ 2027.247789] CPU: 1 PID: 13236 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2027.248784] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2027.249954] Call Trace: [ 2027.250334] dump_stack+0x107/0x167 [ 2027.250913] should_fail.cold+0x5/0xa [ 2027.251440] ? create_object.isra.0+0x3a/0xa20 [ 2027.252102] should_failslab+0x5/0x20 [ 2027.252669] kmem_cache_alloc+0x5b/0x360 [ 2027.253270] create_object.isra.0+0x3a/0xa20 [ 2027.253882] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2027.254665] kmem_cache_alloc+0x159/0x360 [ 2027.255266] ? _down_write_nest_lock+0x160/0x160 [ 2027.255953] jbd2__journal_start+0x190/0x890 [ 2027.256579] __ext4_journal_start_sb+0x214/0x430 [ 2027.257276] ext4_xattr_set+0x23a/0x340 [ 2027.257832] ? ext4_xattr_set_credits+0x200/0x200 [ 2027.258568] ? _down_write_nest_lock+0x160/0x160 [ 2027.259245] ? xattr_resolve_name+0x26e/0x3e0 [ 2027.259880] ? ext4_initxattrs+0x120/0x120 [ 2027.260464] __vfs_removexattr+0xf9/0x170 [ 2027.261061] ? __vfs_getxattr+0x150/0x150 [ 2027.261654] cap_inode_killpriv+0x19/0x50 [ 2027.262237] security_inode_killpriv+0x46/0xa0 [ 2027.262919] setattr_prepare+0x19f/0x7e0 [ 2027.263488] ext4_setattr+0x1a8/0x22c0 [ 2027.264031] ? igrab+0xc0/0xc0 [ 2027.264492] ? ext4_xattr_security_set+0x40/0x40 [ 2027.265335] ? ext4_journalled_write_end+0x1240/0x1240 [ 2027.266067] notify_change+0xba2/0x1080 [ 2027.266668] file_remove_privs+0x386/0x540 [ 2027.267291] ? init_once+0x230/0x230 [ 2027.267861] ? generic_write_checks+0x2ad/0x390 [ 2027.268522] ? down_write+0xe0/0x160 [ 2027.269037] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2027.269740] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2027.270528] file_modified+0x14/0xa0 [ 2027.271049] ext4_file_write_iter+0x906/0x18e0 [ 2027.271705] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2027.272370] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2027.273115] ? SOFTIRQ_verbose+0x10/0x10 [ 2027.273697] new_sync_write+0x42c/0x660 [ 2027.274268] ? new_sync_read+0x6f0/0x6f0 [ 2027.274899] ? ksys_write+0x12d/0x260 [ 2027.275453] ? lock_release+0x6b0/0x6b0 [ 2027.276028] ? selinux_file_permission+0x36/0x510 [ 2027.276703] ? __fget_files+0x296/0x480 [ 2027.277304] vfs_write+0x747/0xa30 [ 2027.277835] ksys_write+0x12d/0x260 [ 2027.278365] ? __ia32_sys_read+0xb0/0xb0 [ 2027.278976] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2027.279725] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2027.280449] do_syscall_64+0x33/0x40 [ 2027.280984] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2027.281669] RIP: 0033:0x7f29c20d1b19 [ 2027.282212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2027.284917] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2027.286076] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2027.287160] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2027.288166] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2027.289166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2027.290200] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:22:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 6) dup3(0xffffffffffffffff, r1, 0x0) 09:22:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:34 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 7) 09:22:34 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:22:34 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:34 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2027.578575] FAULT_INJECTION: forcing a failure. [ 2027.578575] name failslab, interval 1, probability 0, space 0, times 0 [ 2027.581039] CPU: 0 PID: 13349 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2027.582080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2027.583258] Call Trace: [ 2027.583638] dump_stack+0x107/0x167 [ 2027.584166] should_fail.cold+0x5/0xa [ 2027.584706] ? create_object.isra.0+0x3a/0xa20 [ 2027.585367] should_failslab+0x5/0x20 [ 2027.585888] kmem_cache_alloc+0x5b/0x360 [ 2027.586477] create_object.isra.0+0x3a/0xa20 [ 2027.587106] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2027.587817] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 2027.588543] ? netlink_sendmsg+0x98e/0xdf0 [ 2027.589167] __alloc_skb+0xb1/0x620 [ 2027.589685] netlink_sendmsg+0x98e/0xdf0 [ 2027.590277] ? netlink_unicast+0x7f0/0x7f0 [ 2027.590921] ? netlink_unicast+0x7f0/0x7f0 [ 2027.591516] sock_sendmsg+0x154/0x190 [ 2027.592055] ____sys_sendmsg+0x70d/0x870 [ 2027.592627] ? kernel_sendmsg+0x50/0x50 [ 2027.593192] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2027.593837] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2027.594588] ? lock_downgrade+0x6d0/0x6d0 [ 2027.595172] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2027.595924] ? SOFTIRQ_verbose+0x10/0x10 [ 2027.596508] ___sys_sendmsg+0xf3/0x170 [ 2027.597089] ? sendmsg_copy_msghdr+0x160/0x160 [ 2027.597742] ? lock_downgrade+0x6d0/0x6d0 [ 2027.598324] ? find_held_lock+0x2c/0x110 [ 2027.598930] ? __fget_files+0x296/0x480 [ 2027.599492] ? __fget_light+0xea/0x290 [ 2027.600041] __sys_sendmsg+0xe5/0x1b0 [ 2027.600590] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2027.601201] ? rcu_read_lock_any_held+0x75/0xa0 [ 2027.601869] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2027.602622] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2027.603347] ? trace_hardirqs_on+0x5b/0x180 [ 2027.603951] do_syscall_64+0x33/0x40 [ 2027.604480] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2027.605205] RIP: 0033:0x7fe21efd1b19 [ 2027.605735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2027.608336] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2027.609404] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2027.610405] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2027.611421] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2027.612433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2027.613444] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 [ 2027.672371] FAULT_INJECTION: forcing a failure. [ 2027.672371] name failslab, interval 1, probability 0, space 0, times 0 [ 2027.674432] CPU: 1 PID: 13358 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2027.675356] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2027.676470] Call Trace: [ 2027.676834] dump_stack+0x107/0x167 [ 2027.677322] should_fail.cold+0x5/0xa [ 2027.677838] ? create_object.isra.0+0x3a/0xa20 [ 2027.678459] should_failslab+0x5/0x20 [ 2027.678995] kmem_cache_alloc+0x5b/0x360 [ 2027.679543] ? jbd2_journal_forget+0x3f9/0x690 [ 2027.680157] create_object.isra.0+0x3a/0xa20 [ 2027.680768] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2027.681454] kmem_cache_alloc+0x159/0x360 [ 2027.681997] ? jbd2_journal_put_journal_head+0x3f2/0x560 [ 2027.682738] insert_revoke_hash+0x28/0x270 [ 2027.683307] jbd2_journal_revoke+0x2bb/0x570 [ 2027.683905] __ext4_forget+0x218/0x480 [ 2027.684432] ext4_free_blocks+0x2d3/0x20f0 [ 2027.685033] ? lock_downgrade+0x6d0/0x6d0 [ 2027.685596] ? ext4_mb_new_blocks+0x4890/0x4890 [ 2027.686225] ? jbd2_write_access_granted+0x60/0x3a0 [ 2027.686904] ? wake_up_var+0x120/0x120 [ 2027.687426] ? mb_cache_entry_delete+0x479/0x630 [ 2027.688072] ext4_xattr_release_block+0x56a/0x810 [ 2027.688723] ext4_xattr_block_set+0x1dff/0x2f30 [ 2027.689364] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 2027.689972] ? xattr_find_entry+0x2aa/0x3b0 [ 2027.690560] ? ext4_xattr_block_find+0x5c/0x6a0 [ 2027.691162] ext4_xattr_set_handle+0x1037/0x1320 [ 2027.691812] ? ext4_xattr_ibody_inline_set+0x3a0/0x3a0 [ 2027.692546] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 2027.693284] ? __ext4_journal_start_sb+0x214/0x430 [ 2027.693922] ? __ext4_journal_start_sb+0x1db/0x430 [ 2027.694622] ext4_xattr_set+0x13a/0x340 [ 2027.695154] ? ext4_xattr_set_credits+0x200/0x200 [ 2027.695803] ? _down_write_nest_lock+0x160/0x160 [ 2027.696432] ? xattr_resolve_name+0x26e/0x3e0 [ 2027.697033] ? ext4_initxattrs+0x120/0x120 [ 2027.697598] __vfs_removexattr+0xf9/0x170 [ 2027.698154] ? __vfs_getxattr+0x150/0x150 [ 2027.698726] cap_inode_killpriv+0x19/0x50 [ 2027.699283] security_inode_killpriv+0x46/0xa0 [ 2027.699906] setattr_prepare+0x19f/0x7e0 [ 2027.700455] ext4_setattr+0x1a8/0x22c0 [ 2027.700984] ? igrab+0xc0/0xc0 [ 2027.701412] ? ext4_xattr_security_set+0x40/0x40 [ 2027.702056] ? ext4_journalled_write_end+0x1240/0x1240 [ 2027.702767] notify_change+0xba2/0x1080 [ 2027.703313] file_remove_privs+0x386/0x540 [ 2027.703876] ? init_once+0x230/0x230 [ 2027.704383] ? generic_write_checks+0x2ad/0x390 [ 2027.705015] ? down_write+0xe0/0x160 [ 2027.705514] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2027.706185] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2027.706936] file_modified+0x14/0xa0 [ 2027.707445] ext4_file_write_iter+0x906/0x18e0 [ 2027.708070] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2027.708688] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2027.709378] ? SOFTIRQ_verbose+0x10/0x10 [ 2027.709918] new_sync_write+0x42c/0x660 [ 2027.710417] ? new_sync_read+0x6f0/0x6f0 [ 2027.710959] ? ksys_write+0x12d/0x260 [ 2027.711500] ? lock_release+0x6b0/0x6b0 [ 2027.712063] ? selinux_file_permission+0x36/0x510 [ 2027.712722] ? __fget_files+0x296/0x480 [ 2027.713238] vfs_write+0x747/0xa30 [ 2027.713714] ksys_write+0x12d/0x260 [ 2027.714194] ? __ia32_sys_read+0xb0/0xb0 [ 2027.714777] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2027.715477] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2027.716154] do_syscall_64+0x33/0x40 [ 2027.716656] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2027.717394] RIP: 0033:0x7f29c20d1b19 [ 2027.717892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2027.720354] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2027.721365] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2027.722312] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2027.723268] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2027.724221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2027.725171] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:22:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 7) dup3(0xffffffffffffffff, r1, 0x0) 09:22:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 8) 09:22:34 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2027.955211] FAULT_INJECTION: forcing a failure. [ 2027.955211] name failslab, interval 1, probability 0, space 0, times 0 [ 2027.957685] CPU: 1 PID: 13472 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2027.958711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2027.959901] Call Trace: [ 2027.960297] dump_stack+0x107/0x167 [ 2027.960825] should_fail.cold+0x5/0xa [ 2027.961369] ? __skb_ext_alloc+0x19/0x90 [ 2027.961956] should_failslab+0x5/0x20 [ 2027.962515] kmem_cache_alloc+0x5b/0x360 [ 2027.963100] __skb_ext_alloc+0x19/0x90 [ 2027.963659] skb_ext_add+0x508/0x670 [ 2027.964201] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 2027.964954] __alloc_skb+0x3c1/0x620 [ 2027.965480] netlink_sendmsg+0x98e/0xdf0 [ 2027.966077] ? netlink_unicast+0x7f0/0x7f0 [ 2027.966721] ? netlink_unicast+0x7f0/0x7f0 [ 2027.967320] sock_sendmsg+0x154/0x190 [ 2027.967873] ____sys_sendmsg+0x70d/0x870 [ 2027.968451] ? kernel_sendmsg+0x50/0x50 [ 2027.969010] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2027.969675] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2027.970437] ? lock_downgrade+0x6d0/0x6d0 [ 2027.971054] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2027.971796] ? SOFTIRQ_verbose+0x10/0x10 [ 2027.972374] ___sys_sendmsg+0xf3/0x170 [ 2027.972937] ? sendmsg_copy_msghdr+0x160/0x160 [ 2027.973587] ? lock_downgrade+0x6d0/0x6d0 [ 2027.974181] ? find_held_lock+0x2c/0x110 [ 2027.974790] ? __fget_files+0x296/0x480 [ 2027.975354] ? __fget_light+0xea/0x290 [ 2027.975914] __sys_sendmsg+0xe5/0x1b0 [ 2027.976458] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2027.977075] ? rcu_read_lock_any_held+0x75/0xa0 [ 2027.977745] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2027.978514] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2027.979253] ? trace_hardirqs_on+0x5b/0x180 [ 2027.979863] do_syscall_64+0x33/0x40 [ 2027.980394] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2027.981138] RIP: 0033:0x7fe21efd1b19 [ 2027.981673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2027.984315] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2027.985416] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2027.986459] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2027.987518] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2027.988504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2027.989507] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 [ 2028.119768] FAULT_INJECTION: forcing a failure. [ 2028.119768] name failslab, interval 1, probability 0, space 0, times 0 [ 2028.121324] CPU: 1 PID: 13476 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2028.122235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2028.123406] Call Trace: [ 2028.123781] dump_stack+0x107/0x167 [ 2028.124307] should_fail.cold+0x5/0xa [ 2028.124838] ? create_object.isra.0+0x3a/0xa20 [ 2028.125440] should_failslab+0x5/0x20 [ 2028.125944] kmem_cache_alloc+0x5b/0x360 [ 2028.126523] ? pagecache_get_page+0x243/0xc80 [ 2028.127210] create_object.isra.0+0x3a/0xa20 [ 2028.127793] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2028.128516] kmem_cache_alloc+0x159/0x360 [ 2028.129101] ext4_free_blocks+0x915/0x20f0 [ 2028.129686] ? ext4_mb_new_blocks+0x4890/0x4890 [ 2028.130348] ? mb_cache_entry_delete+0x479/0x630 [ 2028.131039] ext4_xattr_release_block+0x56a/0x810 [ 2028.131680] ext4_xattr_block_set+0x1dff/0x2f30 [ 2028.132320] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 2028.132954] ? xattr_find_entry+0x2aa/0x3b0 [ 2028.133541] ? ext4_xattr_block_find+0x5c/0x6a0 [ 2028.134170] ext4_xattr_set_handle+0x1037/0x1320 [ 2028.134821] ? ext4_xattr_ibody_inline_set+0x3a0/0x3a0 [ 2028.135565] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 2028.136274] ? __ext4_journal_start_sb+0x214/0x430 [ 2028.136926] ? __ext4_journal_start_sb+0x1db/0x430 [ 2028.137593] ext4_xattr_set+0x13a/0x340 [ 2028.138129] ? ext4_xattr_set_credits+0x200/0x200 [ 2028.138790] ? _down_write_nest_lock+0x160/0x160 [ 2028.139456] ? xattr_resolve_name+0x26e/0x3e0 [ 2028.140074] ? ext4_initxattrs+0x120/0x120 [ 2028.140634] __vfs_removexattr+0xf9/0x170 [ 2028.141188] ? __vfs_getxattr+0x150/0x150 [ 2028.141761] cap_inode_killpriv+0x19/0x50 [ 2028.142379] security_inode_killpriv+0x46/0xa0 [ 2028.143043] setattr_prepare+0x19f/0x7e0 [ 2028.143592] ext4_setattr+0x1a8/0x22c0 [ 2028.144116] ? igrab+0xc0/0xc0 [ 2028.144550] ? ext4_xattr_security_set+0x40/0x40 [ 2028.145219] ? ext4_journalled_write_end+0x1240/0x1240 [ 2028.145919] notify_change+0xba2/0x1080 [ 2028.146496] file_remove_privs+0x386/0x540 [ 2028.147080] ? init_once+0x230/0x230 [ 2028.147610] ? generic_write_checks+0x2ad/0x390 [ 2028.148236] ? down_write+0xe0/0x160 [ 2028.148716] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2028.149371] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2028.150040] file_modified+0x14/0xa0 [ 2028.150559] ext4_file_write_iter+0x906/0x18e0 [ 2028.151187] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2028.151799] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2028.152490] ? SOFTIRQ_verbose+0x10/0x10 [ 2028.153054] new_sync_write+0x42c/0x660 [ 2028.153647] ? new_sync_read+0x6f0/0x6f0 [ 2028.154194] ? ksys_write+0x12d/0x260 [ 2028.154736] ? lock_release+0x6b0/0x6b0 [ 2028.155272] ? selinux_file_permission+0x36/0x510 [ 2028.155940] ? __fget_files+0x296/0x480 [ 2028.156527] vfs_write+0x747/0xa30 [ 2028.157005] ksys_write+0x12d/0x260 [ 2028.157499] ? __ia32_sys_read+0xb0/0xb0 [ 2028.158046] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2028.158763] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2028.159452] do_syscall_64+0x33/0x40 [ 2028.159947] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2028.160641] RIP: 0033:0x7f29c20d1b19 [ 2028.161150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2028.163604] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2028.164590] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2028.165532] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2028.166567] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2028.167512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2028.168451] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2041.396534] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:22:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:22:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:56 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 9) 09:22:56 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:56 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={0x0, 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 8) dup3(0xffffffffffffffff, r1, 0x0) 09:22:56 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2049.814983] perf: interrupt took too long (6478 > 6322), lowering kernel.perf_event_max_sample_rate to 30000 [ 2049.842519] FAULT_INJECTION: forcing a failure. [ 2049.842519] name failslab, interval 1, probability 0, space 0, times 0 [ 2049.844606] CPU: 0 PID: 13510 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2049.845630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2049.846866] Call Trace: [ 2049.847244] dump_stack+0x107/0x167 [ 2049.847758] should_fail.cold+0x5/0xa [ 2049.848296] ? create_object.isra.0+0x3a/0xa20 [ 2049.848983] should_failslab+0x5/0x20 [ 2049.849500] kmem_cache_alloc+0x5b/0x360 [ 2049.850045] create_object.isra.0+0x3a/0xa20 [ 2049.850644] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2049.851372] kmem_cache_alloc+0x159/0x360 [ 2049.851964] __skb_ext_alloc+0x19/0x90 [ 2049.852509] skb_ext_add+0x508/0x670 [ 2049.853034] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 2049.853754] __alloc_skb+0x3c1/0x620 [ 2049.854251] netlink_sendmsg+0x98e/0xdf0 [ 2049.854861] ? netlink_unicast+0x7f0/0x7f0 [ 2049.855442] ? netlink_unicast+0x7f0/0x7f0 [ 2049.856048] sock_sendmsg+0x154/0x190 [ 2049.856571] ____sys_sendmsg+0x70d/0x870 [ 2049.857165] ? kernel_sendmsg+0x50/0x50 [ 2049.857698] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2049.858324] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2049.859070] ? lock_downgrade+0x6d0/0x6d0 [ 2049.859638] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2049.860346] ? SOFTIRQ_verbose+0x10/0x10 [ 2049.860900] ___sys_sendmsg+0xf3/0x170 [ 2049.861432] ? sendmsg_copy_msghdr+0x160/0x160 [ 2049.862095] ? lock_downgrade+0x6d0/0x6d0 [ 2049.862682] ? find_held_lock+0x2c/0x110 [ 2049.863285] ? __fget_files+0x296/0x480 [ 2049.863836] ? __fget_light+0xea/0x290 [ 2049.864373] __sys_sendmsg+0xe5/0x1b0 [ 2049.864888] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2049.865471] ? rcu_read_lock_any_held+0x75/0xa0 [ 2049.866098] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2049.866819] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2049.867519] ? trace_hardirqs_on+0x5b/0x180 [ 2049.868085] do_syscall_64+0x33/0x40 [ 2049.868609] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2049.869344] RIP: 0033:0x7fe21efd1b19 [ 2049.869873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2049.872581] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2049.873824] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2049.874889] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2049.875899] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2049.876896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2049.877924] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 09:22:56 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:22:56 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:22:56 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2049.903991] FAULT_INJECTION: forcing a failure. [ 2049.903991] name failslab, interval 1, probability 0, space 0, times 0 [ 2049.905700] CPU: 1 PID: 13490 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2049.906652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2049.907825] Call Trace: [ 2049.908209] dump_stack+0x107/0x167 [ 2049.908727] should_fail.cold+0x5/0xa [ 2049.909254] ? jbd2__journal_start+0x190/0x890 [ 2049.909884] should_failslab+0x5/0x20 [ 2049.910417] kmem_cache_alloc+0x5b/0x360 [ 2049.911004] jbd2__journal_start+0x190/0x890 [ 2049.911615] __ext4_journal_start_sb+0x214/0x430 [ 2049.912273] ext4_dirty_inode+0xbc/0x130 [ 2049.912817] ? ext4_setattr+0x22c0/0x22c0 [ 2049.913367] __mark_inode_dirty+0x492/0xf10 [ 2049.913937] ? ext4_fc_start_update+0xa2/0x2e0 [ 2049.914554] ext4_setattr+0x7db/0x22c0 [ 2049.915119] ? igrab+0xc0/0xc0 [ 2049.915571] ? ext4_xattr_security_set+0x40/0x40 [ 2049.916246] ? ext4_journalled_write_end+0x1240/0x1240 [ 2049.916980] notify_change+0xba2/0x1080 [ 2049.917537] file_remove_privs+0x386/0x540 [ 2049.918161] ? init_once+0x230/0x230 [ 2049.918694] ? generic_write_checks+0x2ad/0x390 [ 2049.919341] ? down_write+0xe0/0x160 [ 2049.919846] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2049.920535] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2049.921258] file_modified+0x14/0xa0 [ 2049.921780] ext4_file_write_iter+0x906/0x18e0 [ 2049.922425] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2049.923104] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2049.923819] ? SOFTIRQ_verbose+0x10/0x10 [ 2049.924379] new_sync_write+0x42c/0x660 [ 2049.924925] ? new_sync_read+0x6f0/0x6f0 [ 2049.925490] ? ksys_write+0x12d/0x260 [ 2049.926019] ? lock_release+0x6b0/0x6b0 [ 2049.926571] ? selinux_file_permission+0x36/0x510 [ 2049.927248] ? __fget_files+0x296/0x480 [ 2049.927814] vfs_write+0x747/0xa30 [ 2049.928310] ksys_write+0x12d/0x260 [ 2049.928817] ? __ia32_sys_read+0xb0/0xb0 [ 2049.929391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2049.930088] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2049.930830] do_syscall_64+0x33/0x40 [ 2049.931368] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2049.932075] RIP: 0033:0x7f29c20d1b19 [ 2049.932569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2049.935088] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2049.936128] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2049.937108] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2049.938064] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2049.939051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2049.940048] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2063.310309] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:23:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 9) dup3(0xffffffffffffffff, r1, 0x0) 09:23:18 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:18 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 10) 09:23:18 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={0x0, 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:23:18 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:23:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2071.349443] FAULT_INJECTION: forcing a failure. [ 2071.349443] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2071.351557] CPU: 0 PID: 13623 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2071.352509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2071.353612] Call Trace: [ 2071.353989] dump_stack+0x107/0x167 [ 2071.354493] should_fail.cold+0x5/0xa [ 2071.355024] _copy_from_iter_full+0x1ff/0x940 [ 2071.355645] ? __check_object_size+0x319/0x440 [ 2071.356248] netlink_sendmsg+0x86f/0xdf0 [ 2071.356766] ? netlink_unicast+0x7f0/0x7f0 [ 2071.357305] ? netlink_unicast+0x7f0/0x7f0 [ 2071.357849] sock_sendmsg+0x154/0x190 [ 2071.358332] ____sys_sendmsg+0x70d/0x870 [ 2071.358857] ? kernel_sendmsg+0x50/0x50 [ 2071.359392] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2071.360039] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2071.360780] ? lock_downgrade+0x6d0/0x6d0 [ 2071.361378] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2071.362059] ? SOFTIRQ_verbose+0x10/0x10 [ 2071.362699] ___sys_sendmsg+0xf3/0x170 [ 2071.363334] ? sendmsg_copy_msghdr+0x160/0x160 [ 2071.363935] ? lock_downgrade+0x6d0/0x6d0 [ 2071.364474] ? find_held_lock+0x2c/0x110 [ 2071.364987] ? __fget_files+0x296/0x480 [ 2071.365521] ? __fget_light+0xea/0x290 [ 2071.366039] __sys_sendmsg+0xe5/0x1b0 [ 2071.366539] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2071.367109] ? rcu_read_lock_any_held+0x75/0xa0 [ 2071.367727] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2071.368434] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2071.369127] ? trace_hardirqs_on+0x5b/0x180 [ 2071.369753] do_syscall_64+0x33/0x40 [ 2071.370282] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2071.371011] RIP: 0033:0x7fe21efd1b19 [ 2071.371667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2071.374549] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2071.375689] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2071.376680] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2071.377748] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2071.378760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2071.379809] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 [ 2071.408824] FAULT_INJECTION: forcing a failure. [ 2071.408824] name failslab, interval 1, probability 0, space 0, times 0 [ 2071.410574] CPU: 1 PID: 13624 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2071.411580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2071.412768] Call Trace: [ 2071.413144] dump_stack+0x107/0x167 [ 2071.413663] should_fail.cold+0x5/0xa [ 2071.414201] ? create_object.isra.0+0x3a/0xa20 [ 2071.414840] should_failslab+0x5/0x20 [ 2071.415381] kmem_cache_alloc+0x5b/0x360 [ 2071.415950] create_object.isra.0+0x3a/0xa20 [ 2071.416521] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2071.417148] kmem_cache_alloc+0x159/0x360 [ 2071.417669] jbd2__journal_start+0x190/0x890 [ 2071.418219] __ext4_journal_start_sb+0x214/0x430 [ 2071.418842] ext4_dirty_inode+0xbc/0x130 [ 2071.419430] ? ext4_setattr+0x22c0/0x22c0 [ 2071.420015] __mark_inode_dirty+0x492/0xf10 [ 2071.420615] ? ext4_fc_start_update+0xa2/0x2e0 [ 2071.421252] ext4_setattr+0x7db/0x22c0 [ 2071.421802] ? igrab+0xc0/0xc0 [ 2071.422251] ? ext4_xattr_security_set+0x40/0x40 [ 2071.422921] ? ext4_journalled_write_end+0x1240/0x1240 [ 2071.423669] notify_change+0xba2/0x1080 [ 2071.424245] file_remove_privs+0x386/0x540 [ 2071.424838] ? init_once+0x230/0x230 [ 2071.425360] ? generic_write_checks+0x2ad/0x390 [ 2071.425989] ? down_write+0xe0/0x160 [ 2071.426507] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2071.427208] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2071.427934] file_modified+0x14/0xa0 [ 2071.428454] ext4_file_write_iter+0x906/0x18e0 [ 2071.429102] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2071.429739] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2071.430462] ? SOFTIRQ_verbose+0x10/0x10 [ 2071.431040] new_sync_write+0x42c/0x660 [ 2071.431630] ? new_sync_read+0x6f0/0x6f0 [ 2071.432187] ? ksys_write+0x12d/0x260 [ 2071.432721] ? lock_release+0x6b0/0x6b0 [ 2071.433278] ? selinux_file_permission+0x36/0x510 [ 2071.433940] ? __fget_files+0x296/0x480 [ 2071.434501] vfs_write+0x747/0xa30 [ 2071.435007] ksys_write+0x12d/0x260 [ 2071.435528] ? __ia32_sys_read+0xb0/0xb0 [ 2071.436096] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2071.436808] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2071.437529] do_syscall_64+0x33/0x40 [ 2071.438025] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2071.438751] RIP: 0033:0x7f29c20d1b19 [ 2071.439278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2071.441805] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2071.442850] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2071.443858] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2071.444831] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2071.445784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2071.446749] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:23:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 10) dup3(0xffffffffffffffff, r1, 0x0) 09:23:18 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:18 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:23:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:23:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 11) 09:23:18 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:23:18 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={0x0, 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2071.674874] FAULT_INJECTION: forcing a failure. [ 2071.674874] name failslab, interval 1, probability 0, space 0, times 0 [ 2071.676995] CPU: 0 PID: 13636 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2071.677909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2071.678989] Call Trace: [ 2071.679369] dump_stack+0x107/0x167 [ 2071.679869] should_fail.cold+0x5/0xa [ 2071.680379] ? __alloc_skb+0x6d/0x620 [ 2071.680894] should_failslab+0x5/0x20 [ 2071.681399] kmem_cache_alloc_node+0x55/0x370 [ 2071.682020] __alloc_skb+0x6d/0x620 [ 2071.682499] netlink_dump+0x735/0x1050 [ 2071.682991] ? netlink_insert+0x1640/0x1640 [ 2071.683586] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2071.684236] ? lock_downgrade+0x6d0/0x6d0 [ 2071.684795] __netlink_dump_start+0x649/0x900 [ 2071.685418] rtnetlink_rcv_msg+0x72a/0xb10 [ 2071.685951] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2071.686559] ? rtnetlink_put_metrics+0x510/0x510 [ 2071.687177] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2071.687762] ? lock_acquire+0x197/0x490 [ 2071.688280] ? netlink_deliver_tap+0xf4/0xc40 [ 2071.688874] netlink_rcv_skb+0x14b/0x430 [ 2071.689420] ? rtnetlink_put_metrics+0x510/0x510 [ 2071.690052] ? netlink_ack+0xab0/0xab0 [ 2071.690565] ? netlink_deliver_tap+0x1ae/0xc40 [ 2071.691210] ? netlink_deliver_tap+0x1c4/0xc40 [ 2071.691804] ? is_vmalloc_addr+0x7b/0xb0 [ 2071.692396] netlink_unicast+0x549/0x7f0 [ 2071.692940] ? netlink_attachskb+0x810/0x810 [ 2071.693532] netlink_sendmsg+0x905/0xdf0 [ 2071.694082] ? netlink_unicast+0x7f0/0x7f0 [ 2071.694648] ? netlink_unicast+0x7f0/0x7f0 [ 2071.695236] sock_sendmsg+0x154/0x190 [ 2071.695746] ____sys_sendmsg+0x70d/0x870 [ 2071.696286] ? kernel_sendmsg+0x50/0x50 [ 2071.696815] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2071.697429] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2071.698153] ? lock_downgrade+0x6d0/0x6d0 [ 2071.698689] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2071.703496] ? SOFTIRQ_verbose+0x10/0x10 [ 2071.704053] ___sys_sendmsg+0xf3/0x170 [ 2071.704569] ? sendmsg_copy_msghdr+0x160/0x160 [ 2071.705161] ? lock_downgrade+0x6d0/0x6d0 [ 2071.705728] ? find_held_lock+0x2c/0x110 [ 2071.706240] ? __fget_files+0x296/0x480 [ 2071.706781] ? __fget_light+0xea/0x290 [ 2071.707323] __sys_sendmsg+0xe5/0x1b0 [ 2071.707824] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2071.708389] ? rcu_read_lock_any_held+0x75/0xa0 [ 2071.709024] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2071.709721] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2071.710394] ? trace_hardirqs_on+0x5b/0x180 [ 2071.710961] do_syscall_64+0x33/0x40 [ 2071.711498] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2071.712162] RIP: 0033:0x7fe21efd1b19 [ 2071.712653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2071.715109] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2071.716120] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2071.717057] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2071.717998] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2071.718949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2071.719946] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 09:23:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 11) dup3(0xffffffffffffffff, r1, 0x0) [ 2071.871739] FAULT_INJECTION: forcing a failure. [ 2071.871739] name failslab, interval 1, probability 0, space 0, times 0 [ 2071.873288] CPU: 0 PID: 13649 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2071.874214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2071.875418] Call Trace: [ 2071.875851] dump_stack+0x107/0x167 [ 2071.876539] should_fail.cold+0x5/0xa [ 2071.877059] ? jbd2__journal_start+0x190/0x890 [ 2071.877672] should_failslab+0x5/0x20 [ 2071.878179] kmem_cache_alloc+0x5b/0x360 [ 2071.878751] jbd2__journal_start+0x190/0x890 [ 2071.879376] __ext4_journal_start_sb+0x214/0x430 [ 2071.880052] ext4_dirty_inode+0xbc/0x130 [ 2071.880582] ? ext4_setattr+0x22c0/0x22c0 [ 2071.881121] __mark_inode_dirty+0x492/0xf10 [ 2071.881697] generic_update_time+0x21c/0x370 [ 2071.882272] file_update_time+0x43a/0x520 [ 2071.882786] ? evict_inodes+0x420/0x420 [ 2071.883327] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2071.883971] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2071.884678] file_modified+0x7d/0xa0 [ 2071.885191] ext4_file_write_iter+0x906/0x18e0 [ 2071.885834] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2071.886470] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2071.887200] ? SOFTIRQ_verbose+0x10/0x10 [ 2071.887734] new_sync_write+0x42c/0x660 [ 2071.888261] ? new_sync_read+0x6f0/0x6f0 [ 2071.888798] ? ksys_write+0x12d/0x260 [ 2071.889297] ? lock_release+0x6b0/0x6b0 [ 2071.889811] ? selinux_file_permission+0x36/0x510 [ 2071.890454] ? __fget_files+0x296/0x480 [ 2071.891005] vfs_write+0x747/0xa30 [ 2071.891516] ksys_write+0x12d/0x260 [ 2071.892034] ? __ia32_sys_read+0xb0/0xb0 [ 2071.892579] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2071.893255] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2071.893957] do_syscall_64+0x33/0x40 [ 2071.894500] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2071.895256] RIP: 0033:0x7f29c20d1b19 [ 2071.895819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2071.898248] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2071.899262] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2071.900238] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2071.901238] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2071.902204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2071.903186] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:23:18 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:23:18 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2071.992164] FAULT_INJECTION: forcing a failure. [ 2071.992164] name failslab, interval 1, probability 0, space 0, times 0 [ 2071.994063] CPU: 0 PID: 13753 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2071.995112] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2071.996486] Call Trace: [ 2071.996854] dump_stack+0x107/0x167 [ 2071.997369] should_fail.cold+0x5/0xa [ 2071.997908] ? create_object.isra.0+0x3a/0xa20 [ 2071.998530] should_failslab+0x5/0x20 [ 2071.999143] kmem_cache_alloc+0x5b/0x360 [ 2071.999737] create_object.isra.0+0x3a/0xa20 [ 2072.000346] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2072.001023] kmem_cache_alloc_node+0x169/0x370 [ 2072.001642] __alloc_skb+0x6d/0x620 [ 2072.002151] netlink_dump+0x735/0x1050 [ 2072.002682] ? netlink_insert+0x1640/0x1640 [ 2072.003269] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2072.003954] ? lock_downgrade+0x6d0/0x6d0 [ 2072.004522] __netlink_dump_start+0x649/0x900 [ 2072.005143] rtnetlink_rcv_msg+0x72a/0xb10 [ 2072.005710] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2072.006284] ? rtnetlink_put_metrics+0x510/0x510 [ 2072.006916] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2072.007525] ? lock_acquire+0x197/0x490 [ 2072.008061] ? netlink_deliver_tap+0xf4/0xc40 [ 2072.008672] netlink_rcv_skb+0x14b/0x430 [ 2072.009229] ? rtnetlink_put_metrics+0x510/0x510 [ 2072.009874] ? netlink_ack+0xab0/0xab0 [ 2072.010397] ? netlink_deliver_tap+0x1ae/0xc40 [ 2072.011003] ? netlink_deliver_tap+0x1c4/0xc40 [ 2072.011641] ? is_vmalloc_addr+0x7b/0xb0 [ 2072.012183] netlink_unicast+0x549/0x7f0 [ 2072.012721] ? netlink_attachskb+0x810/0x810 [ 2072.013338] netlink_sendmsg+0x905/0xdf0 [ 2072.013925] ? netlink_unicast+0x7f0/0x7f0 [ 2072.014517] ? netlink_unicast+0x7f0/0x7f0 [ 2072.015106] sock_sendmsg+0x154/0x190 [ 2072.015626] ____sys_sendmsg+0x70d/0x870 [ 2072.016185] ? kernel_sendmsg+0x50/0x50 [ 2072.016717] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2072.017333] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2072.018042] ? lock_downgrade+0x6d0/0x6d0 [ 2072.018594] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2072.019333] ? SOFTIRQ_verbose+0x10/0x10 [ 2072.019875] ___sys_sendmsg+0xf3/0x170 [ 2072.020386] ? sendmsg_copy_msghdr+0x160/0x160 [ 2072.020987] ? lock_downgrade+0x6d0/0x6d0 [ 2072.021560] ? find_held_lock+0x2c/0x110 [ 2072.022142] ? __fget_files+0x296/0x480 [ 2072.022688] ? __fget_light+0xea/0x290 [ 2072.023245] __sys_sendmsg+0xe5/0x1b0 [ 2072.023767] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2072.024350] ? rcu_read_lock_any_held+0x75/0xa0 [ 2072.025002] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2072.025717] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2072.026417] ? trace_hardirqs_on+0x5b/0x180 [ 2072.027031] do_syscall_64+0x33/0x40 [ 2072.027571] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2072.028263] RIP: 0033:0x7fe21efd1b19 [ 2072.028773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2072.031288] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2072.032353] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2072.033347] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2072.034306] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2072.035295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2072.036256] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 09:23:19 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 12) [ 2072.320467] FAULT_INJECTION: forcing a failure. [ 2072.320467] name failslab, interval 1, probability 0, space 0, times 0 [ 2072.322109] CPU: 1 PID: 13771 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2072.323130] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2072.324419] Call Trace: [ 2072.324907] dump_stack+0x107/0x167 [ 2072.325452] should_fail.cold+0x5/0xa [ 2072.326052] ? jbd2__journal_start+0x190/0x890 [ 2072.326790] should_failslab+0x5/0x20 [ 2072.327397] kmem_cache_alloc+0x5b/0x360 [ 2072.328054] jbd2__journal_start+0x190/0x890 [ 2072.328790] __ext4_journal_start_sb+0x214/0x430 [ 2072.329465] ext4_dirty_inode+0xbc/0x130 [ 2072.330131] ? ext4_setattr+0x22c0/0x22c0 [ 2072.330799] __mark_inode_dirty+0x492/0xf10 [ 2072.331477] generic_update_time+0x21c/0x370 [ 2072.332187] file_update_time+0x43a/0x520 [ 2072.332804] ? evict_inodes+0x420/0x420 [ 2072.333453] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2072.334265] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2072.335023] file_modified+0x7d/0xa0 [ 2072.335644] ext4_file_write_iter+0x906/0x18e0 [ 2072.336393] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2072.337088] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2072.337939] ? SOFTIRQ_verbose+0x10/0x10 [ 2072.338523] new_sync_write+0x42c/0x660 [ 2072.339166] ? new_sync_read+0x6f0/0x6f0 [ 2072.339863] ? ksys_write+0x12d/0x260 [ 2072.340382] ? lock_release+0x6b0/0x6b0 [ 2072.341015] ? selinux_file_permission+0x36/0x510 [ 2072.341783] ? __fget_files+0x296/0x480 [ 2072.342363] vfs_write+0x747/0xa30 [ 2072.342864] ksys_write+0x12d/0x260 [ 2072.343502] ? __ia32_sys_read+0xb0/0xb0 [ 2072.344160] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2072.344993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2072.345734] do_syscall_64+0x33/0x40 [ 2072.346266] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2072.346975] RIP: 0033:0x7f29c20d1b19 [ 2072.347491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2072.349984] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2072.351049] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2072.352014] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2072.352966] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2072.353972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2072.355001] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2085.437550] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:23:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 13) 09:23:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:23:40 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:40 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:23:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 12) dup3(0xffffffffffffffff, r1, 0x0) 09:23:40 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:40 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2093.310213] FAULT_INJECTION: forcing a failure. [ 2093.310213] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.311781] CPU: 1 PID: 13788 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2093.312707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2093.313819] Call Trace: [ 2093.314185] dump_stack+0x107/0x167 [ 2093.314682] should_fail.cold+0x5/0xa [ 2093.315204] should_failslab+0x5/0x20 [ 2093.315734] __kmalloc_node_track_caller+0x74/0x3f0 [ 2093.316406] ? netlink_dump+0x735/0x1050 [ 2093.316959] __alloc_skb+0xb1/0x620 [ 2093.317460] netlink_dump+0x735/0x1050 [ 2093.317993] ? netlink_insert+0x1640/0x1640 [ 2093.318567] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2093.319227] ? lock_downgrade+0x6d0/0x6d0 [ 2093.319815] __netlink_dump_start+0x649/0x900 [ 2093.320427] rtnetlink_rcv_msg+0x72a/0xb10 [ 2093.320998] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2093.321595] ? rtnetlink_put_metrics+0x510/0x510 [ 2093.322233] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2093.322833] ? lock_acquire+0x197/0x490 [ 2093.323376] ? netlink_deliver_tap+0xf4/0xc40 [ 2093.323989] netlink_rcv_skb+0x14b/0x430 [ 2093.324539] ? rtnetlink_put_metrics+0x510/0x510 [ 2093.325178] ? netlink_ack+0xab0/0xab0 [ 2093.325700] ? netlink_deliver_tap+0x1ae/0xc40 [ 2093.326321] ? netlink_deliver_tap+0x1c4/0xc40 [ 2093.326936] ? is_vmalloc_addr+0x7b/0xb0 [ 2093.327496] netlink_unicast+0x549/0x7f0 [ 2093.328059] ? netlink_attachskb+0x810/0x810 [ 2093.328659] netlink_sendmsg+0x905/0xdf0 [ 2093.329224] ? netlink_unicast+0x7f0/0x7f0 [ 2093.329807] ? netlink_unicast+0x7f0/0x7f0 [ 2093.330395] sock_sendmsg+0x154/0x190 [ 2093.330911] ____sys_sendmsg+0x70d/0x870 [ 2093.331492] ? kernel_sendmsg+0x50/0x50 [ 2093.332029] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2093.332645] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2093.333366] ? lock_downgrade+0x6d0/0x6d0 [ 2093.333926] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2093.334635] ? SOFTIRQ_verbose+0x10/0x10 [ 2093.335186] ___sys_sendmsg+0xf3/0x170 [ 2093.335726] ? sendmsg_copy_msghdr+0x160/0x160 [ 2093.336371] ? lock_downgrade+0x6d0/0x6d0 [ 2093.336945] ? find_held_lock+0x2c/0x110 [ 2093.337497] ? __fget_files+0x296/0x480 [ 2093.338047] ? __fget_light+0xea/0x290 [ 2093.338584] __sys_sendmsg+0xe5/0x1b0 [ 2093.339106] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2093.339714] ? rcu_read_lock_any_held+0x75/0xa0 [ 2093.340357] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2093.341066] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2093.341762] ? trace_hardirqs_on+0x5b/0x180 [ 2093.342343] do_syscall_64+0x33/0x40 [ 2093.342854] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2093.343556] RIP: 0033:0x7fe21efd1b19 [ 2093.344060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2093.346508] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2093.347539] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2093.348503] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2093.349436] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2093.350400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2093.351375] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 09:23:40 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:23:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 13) dup3(0xffffffffffffffff, r1, 0x0) [ 2093.458471] FAULT_INJECTION: forcing a failure. [ 2093.458471] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.460449] CPU: 0 PID: 13785 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2093.461400] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2093.462519] Call Trace: [ 2093.462893] dump_stack+0x107/0x167 [ 2093.463414] should_fail.cold+0x5/0xa [ 2093.463934] ? jbd2__journal_start+0x190/0x890 [ 2093.464559] should_failslab+0x5/0x20 [ 2093.465079] kmem_cache_alloc+0x5b/0x360 [ 2093.465640] jbd2__journal_start+0x190/0x890 [ 2093.466248] __ext4_journal_start_sb+0x214/0x430 [ 2093.466902] ext4_file_write_iter+0xdbf/0x18e0 [ 2093.467553] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2093.468180] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2093.468890] ? SOFTIRQ_verbose+0x10/0x10 [ 2093.469445] new_sync_write+0x42c/0x660 [ 2093.469981] ? new_sync_read+0x6f0/0x6f0 [ 2093.470527] ? ksys_write+0x12d/0x260 [ 2093.471046] ? lock_release+0x6b0/0x6b0 [ 2093.471602] ? selinux_file_permission+0x36/0x510 [ 2093.472269] ? __fget_files+0x296/0x480 [ 2093.472828] vfs_write+0x747/0xa30 [ 2093.473331] ksys_write+0x12d/0x260 [ 2093.473834] ? __ia32_sys_read+0xb0/0xb0 [ 2093.474395] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2093.475102] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2093.475833] do_syscall_64+0x33/0x40 [ 2093.476339] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2093.477039] RIP: 0033:0x7f29c20d1b19 [ 2093.477556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2093.480124] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2093.481177] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2093.482148] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2093.483119] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2093.484124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2093.485102] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:23:40 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:23:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:23:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 14) 09:23:40 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:23:40 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2093.666488] FAULT_INJECTION: forcing a failure. [ 2093.666488] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.668561] CPU: 0 PID: 13901 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2093.669523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2093.670632] Call Trace: [ 2093.670993] dump_stack+0x107/0x167 [ 2093.671505] should_fail.cold+0x5/0xa [ 2093.672017] ? create_object.isra.0+0x3a/0xa20 [ 2093.672635] should_failslab+0x5/0x20 [ 2093.673146] kmem_cache_alloc+0x5b/0x360 [ 2093.673698] create_object.isra.0+0x3a/0xa20 [ 2093.674290] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2093.674988] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 2093.675706] ? netlink_dump+0x735/0x1050 [ 2093.676256] __alloc_skb+0xb1/0x620 [ 2093.676762] netlink_dump+0x735/0x1050 [ 2093.677292] ? netlink_insert+0x1640/0x1640 [ 2093.677871] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2093.678542] ? lock_downgrade+0x6d0/0x6d0 [ 2093.679114] __netlink_dump_start+0x649/0x900 [ 2093.679770] rtnetlink_rcv_msg+0x72a/0xb10 [ 2093.680347] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2093.680950] ? rtnetlink_put_metrics+0x510/0x510 [ 2093.681586] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2093.682179] ? lock_acquire+0x197/0x490 [ 2093.682731] ? netlink_deliver_tap+0xf4/0xc40 [ 2093.683343] netlink_rcv_skb+0x14b/0x430 [ 2093.683915] ? rtnetlink_put_metrics+0x510/0x510 [ 2093.684558] ? netlink_ack+0xab0/0xab0 [ 2093.685093] ? netlink_deliver_tap+0x1ae/0xc40 [ 2093.685735] ? netlink_deliver_tap+0x1c4/0xc40 [ 2093.686362] ? is_vmalloc_addr+0x7b/0xb0 [ 2093.686949] netlink_unicast+0x549/0x7f0 [ 2093.687526] ? netlink_attachskb+0x810/0x810 [ 2093.688128] netlink_sendmsg+0x905/0xdf0 [ 2093.688696] ? netlink_unicast+0x7f0/0x7f0 [ 2093.689285] ? netlink_unicast+0x7f0/0x7f0 [ 2093.689857] sock_sendmsg+0x154/0x190 [ 2093.690373] ____sys_sendmsg+0x70d/0x870 [ 2093.690924] ? kernel_sendmsg+0x50/0x50 [ 2093.691476] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2093.692093] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2093.692808] ? lock_downgrade+0x6d0/0x6d0 [ 2093.693372] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2093.694080] ? SOFTIRQ_verbose+0x10/0x10 [ 2093.694649] ___sys_sendmsg+0xf3/0x170 [ 2093.695182] ? sendmsg_copy_msghdr+0x160/0x160 [ 2093.695825] ? lock_downgrade+0x6d0/0x6d0 [ 2093.696397] ? find_held_lock+0x2c/0x110 [ 2093.696969] ? __fget_files+0x296/0x480 [ 2093.697517] ? __fget_light+0xea/0x290 [ 2093.698095] __sys_sendmsg+0xe5/0x1b0 [ 2093.698637] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2093.699224] ? rcu_read_lock_any_held+0x75/0xa0 [ 2093.699886] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2093.700593] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2093.701303] ? trace_hardirqs_on+0x5b/0x180 [ 2093.701887] do_syscall_64+0x33/0x40 [ 2093.702395] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2093.703090] RIP: 0033:0x7fe21efd1b19 [ 2093.703614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2093.706099] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2093.707121] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2093.708102] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2093.709067] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2093.710063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2093.711041] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 [ 2093.818868] FAULT_INJECTION: forcing a failure. [ 2093.818868] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.820434] CPU: 0 PID: 13911 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2093.821354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2093.822457] Call Trace: [ 2093.822816] dump_stack+0x107/0x167 [ 2093.823316] should_fail.cold+0x5/0xa [ 2093.823845] ? create_object.isra.0+0x3a/0xa20 [ 2093.824505] should_failslab+0x5/0x20 [ 2093.825036] kmem_cache_alloc+0x5b/0x360 [ 2093.825588] create_object.isra.0+0x3a/0xa20 [ 2093.826176] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2093.826864] kmem_cache_alloc+0x159/0x360 [ 2093.827463] jbd2__journal_start+0x190/0x890 [ 2093.828059] __ext4_journal_start_sb+0x214/0x430 [ 2093.828713] ext4_file_write_iter+0xdbf/0x18e0 [ 2093.829348] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2093.829983] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2093.830693] ? SOFTIRQ_verbose+0x10/0x10 [ 2093.831251] new_sync_write+0x42c/0x660 [ 2093.831811] ? new_sync_read+0x6f0/0x6f0 [ 2093.832365] ? ksys_write+0x12d/0x260 [ 2093.832881] ? lock_release+0x6b0/0x6b0 [ 2093.833427] ? selinux_file_permission+0x36/0x510 [ 2093.834086] ? __fget_files+0x296/0x480 [ 2093.834630] vfs_write+0x747/0xa30 [ 2093.835117] ksys_write+0x12d/0x260 [ 2093.835715] ? __ia32_sys_read+0xb0/0xb0 [ 2093.836307] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2093.837025] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2093.837723] do_syscall_64+0x33/0x40 [ 2093.838270] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2093.838991] RIP: 0033:0x7f29c20d1b19 [ 2093.839503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2093.841992] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2093.843038] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2093.847966] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2093.848746] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2093.849532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2093.850323] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2106.651055] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:24:01 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:01 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:24:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 15) 09:24:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:01 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c00038008000100040000000800020006000000080001000800000008000200070000004000028004000400080002000200000008000200400000000400040024000380080001"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:01 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:01 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 14) dup3(0xffffffffffffffff, r1, 0x0) [ 2114.486777] FAULT_INJECTION: forcing a failure. [ 2114.486777] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.488507] CPU: 1 PID: 14026 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2114.489410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2114.490496] Call Trace: [ 2114.490855] dump_stack+0x107/0x167 [ 2114.491334] should_fail.cold+0x5/0xa [ 2114.491852] ? __iomap_dio_rw+0x1ee/0x11a0 [ 2114.492412] should_failslab+0x5/0x20 [ 2114.492910] kmem_cache_alloc_trace+0x55/0x360 [ 2114.493514] __iomap_dio_rw+0x1ee/0x11a0 [ 2114.494083] ? jbd2_journal_stop+0x188/0xe70 [ 2114.494707] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2114.495331] ? ext4_orphan_add+0x253/0x9e0 [ 2114.496122] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2114.496869] ? ext4_empty_dir+0xae0/0xae0 [ 2114.497535] ? jbd2__journal_start+0xf3/0x890 [ 2114.498158] iomap_dio_rw+0x31/0x90 [ 2114.498639] ext4_file_write_iter+0xb26/0x18e0 [ 2114.499247] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2114.499896] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2114.500566] ? SOFTIRQ_verbose+0x10/0x10 [ 2114.501104] new_sync_write+0x42c/0x660 [ 2114.501622] ? new_sync_read+0x6f0/0x6f0 [ 2114.502309] ? ksys_write+0x12d/0x260 [ 2114.502874] ? lock_release+0x6b0/0x6b0 [ 2114.503456] ? selinux_file_permission+0x36/0x510 [ 2114.504105] ? __fget_files+0x296/0x480 [ 2114.504629] vfs_write+0x747/0xa30 [ 2114.505093] ksys_write+0x12d/0x260 [ 2114.505562] ? __ia32_sys_read+0xb0/0xb0 [ 2114.506094] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2114.506781] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2114.507541] do_syscall_64+0x33/0x40 [ 2114.508165] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2114.508921] RIP: 0033:0x7f29c20d1b19 [ 2114.509403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2114.511796] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2114.512799] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2114.513784] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2114.514718] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2114.515707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2114.516704] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2114.528381] FAULT_INJECTION: forcing a failure. [ 2114.528381] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.529947] CPU: 1 PID: 14033 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2114.530884] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2114.531997] Call Trace: [ 2114.532359] dump_stack+0x107/0x167 [ 2114.532873] should_fail.cold+0x5/0xa [ 2114.533392] ? __skb_ext_alloc+0x19/0x90 [ 2114.533930] should_failslab+0x5/0x20 [ 2114.534445] kmem_cache_alloc+0x5b/0x360 [ 2114.534991] __skb_ext_alloc+0x19/0x90 [ 2114.535532] skb_ext_add+0x508/0x670 [ 2114.536089] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 2114.536780] __alloc_skb+0x3c1/0x620 [ 2114.537247] netlink_dump+0x735/0x1050 [ 2114.537759] ? netlink_insert+0x1640/0x1640 [ 2114.538322] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2114.538954] ? lock_downgrade+0x6d0/0x6d0 [ 2114.539507] __netlink_dump_start+0x649/0x900 [ 2114.540113] rtnetlink_rcv_msg+0x72a/0xb10 [ 2114.540651] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2114.541220] ? rtnetlink_put_metrics+0x510/0x510 [ 2114.541824] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2114.542384] ? lock_acquire+0x197/0x490 [ 2114.542903] ? netlink_deliver_tap+0xf4/0xc40 [ 2114.543487] netlink_rcv_skb+0x14b/0x430 [ 2114.544041] ? rtnetlink_put_metrics+0x510/0x510 [ 2114.544653] ? netlink_ack+0xab0/0xab0 [ 2114.545157] ? netlink_deliver_tap+0x1ae/0xc40 [ 2114.545742] ? netlink_deliver_tap+0x1c4/0xc40 [ 2114.546326] ? is_vmalloc_addr+0x7b/0xb0 [ 2114.546848] netlink_unicast+0x549/0x7f0 [ 2114.547389] ? netlink_attachskb+0x810/0x810 [ 2114.547979] netlink_sendmsg+0x905/0xdf0 [ 2114.548505] ? netlink_unicast+0x7f0/0x7f0 [ 2114.549060] ? netlink_unicast+0x7f0/0x7f0 [ 2114.549629] sock_sendmsg+0x154/0x190 [ 2114.550174] ____sys_sendmsg+0x70d/0x870 [ 2114.550719] ? kernel_sendmsg+0x50/0x50 [ 2114.551241] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2114.551879] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2114.552614] ? lock_downgrade+0x6d0/0x6d0 [ 2114.553209] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2114.553885] ? SOFTIRQ_verbose+0x10/0x10 [ 2114.554408] ___sys_sendmsg+0xf3/0x170 [ 2114.554911] ? sendmsg_copy_msghdr+0x160/0x160 [ 2114.555499] ? lock_downgrade+0x6d0/0x6d0 [ 2114.556059] ? find_held_lock+0x2c/0x110 [ 2114.556604] ? __fget_files+0x296/0x480 [ 2114.557148] ? __fget_light+0xea/0x290 [ 2114.557673] __sys_sendmsg+0xe5/0x1b0 [ 2114.558166] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2114.558727] ? rcu_read_lock_any_held+0x75/0xa0 [ 2114.559341] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2114.560039] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2114.560693] ? trace_hardirqs_on+0x5b/0x180 [ 2114.561251] do_syscall_64+0x33/0x40 [ 2114.561731] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2114.562414] RIP: 0033:0x7fe21efd1b19 [ 2114.563085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2114.565734] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2114.566760] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2114.567732] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2114.568723] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2114.569688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2114.570966] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 09:24:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:01 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:01 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:01 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 16) [ 2114.954271] FAULT_INJECTION: forcing a failure. [ 2114.954271] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.956255] CPU: 0 PID: 14148 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2114.957209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2114.958330] Call Trace: [ 2114.958690] dump_stack+0x107/0x167 [ 2114.959176] should_fail.cold+0x5/0xa [ 2114.959683] ? create_object.isra.0+0x3a/0xa20 [ 2114.960277] should_failslab+0x5/0x20 [ 2114.960787] kmem_cache_alloc+0x5b/0x360 [ 2114.961337] create_object.isra.0+0x3a/0xa20 [ 2114.961919] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2114.962553] kmem_cache_alloc+0x159/0x360 [ 2114.963083] jbd2__journal_start+0x190/0x890 [ 2114.963655] __ext4_journal_start_sb+0x214/0x430 [ 2114.964298] ext4_file_write_iter+0xdbf/0x18e0 [ 2114.964924] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2114.965500] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2114.966157] ? SOFTIRQ_verbose+0x10/0x10 [ 2114.966672] new_sync_write+0x42c/0x660 [ 2114.967171] ? new_sync_read+0x6f0/0x6f0 [ 2114.967713] ? ksys_write+0x12d/0x260 [ 2114.968192] ? lock_release+0x6b0/0x6b0 [ 2114.968692] ? selinux_file_permission+0x36/0x510 [ 2114.969303] ? __fget_files+0x296/0x480 [ 2114.969812] vfs_write+0x747/0xa30 [ 2114.970299] ksys_write+0x12d/0x260 [ 2114.970832] ? __ia32_sys_read+0xb0/0xb0 [ 2114.971383] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2114.972104] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2114.972773] do_syscall_64+0x33/0x40 [ 2114.973264] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2114.973948] RIP: 0033:0x7f29c20d1b19 [ 2114.974442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2114.976774] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2114.977773] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2114.978665] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2114.979558] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2114.980487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2114.981381] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2127.904483] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:24:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 17) 09:24:22 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:22 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 15) dup3(0xffffffffffffffff, r1, 0x0) 09:24:22 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:22 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 2135.630102] FAULT_INJECTION: forcing a failure. [ 2135.630102] name failslab, interval 1, probability 0, space 0, times 0 [ 2135.632051] CPU: 1 PID: 14164 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2135.633221] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2135.634345] Call Trace: [ 2135.634715] dump_stack+0x107/0x167 [ 2135.635213] should_fail.cold+0x5/0xa [ 2135.635740] ? jbd2__journal_start+0x190/0x890 [ 2135.636383] should_failslab+0x5/0x20 [ 2135.636900] kmem_cache_alloc+0x5b/0x360 [ 2135.637464] jbd2__journal_start+0x190/0x890 [ 2135.638079] __ext4_journal_start_sb+0x214/0x430 [ 2135.638738] ext4_iomap_begin+0x485/0x700 [ 2135.639311] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2135.640020] ? iomap_dio_rw+0x31/0x90 [ 2135.640535] ? vfs_write+0x747/0xa30 [ 2135.641056] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2135.641937] ? lock_chain_count+0x20/0x20 [ 2135.642528] iomap_apply+0x164/0x9e0 [ 2135.643043] ? iomap_dio_rw+0x90/0x90 [ 2135.643572] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2135.643977] FAULT_INJECTION: forcing a failure. [ 2135.643977] name failslab, interval 1, probability 0, space 0, times 0 [ 2135.644389] ? mark_held_locks+0x9e/0xe0 [ 2135.646574] ? filemap_check_errors+0xa5/0x150 [ 2135.647206] __iomap_dio_rw+0x6cd/0x11a0 [ 2135.647768] ? iomap_dio_rw+0x90/0x90 [ 2135.648319] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2135.648951] ? ext4_orphan_add+0x253/0x9e0 [ 2135.649520] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2135.650198] ? ext4_empty_dir+0xae0/0xae0 [ 2135.650766] ? jbd2__journal_start+0xf3/0x890 [ 2135.651389] iomap_dio_rw+0x31/0x90 [ 2135.651901] ext4_file_write_iter+0xb26/0x18e0 [ 2135.652569] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2135.653205] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2135.653918] ? SOFTIRQ_verbose+0x10/0x10 [ 2135.654476] new_sync_write+0x42c/0x660 [ 2135.655032] ? new_sync_read+0x6f0/0x6f0 [ 2135.655591] ? ksys_write+0x12d/0x260 [ 2135.656129] ? lock_release+0x6b0/0x6b0 [ 2135.656669] ? selinux_file_permission+0x36/0x510 [ 2135.657333] ? __fget_files+0x296/0x480 [ 2135.657889] vfs_write+0x747/0xa30 [ 2135.658376] ksys_write+0x12d/0x260 [ 2135.658873] ? __ia32_sys_read+0xb0/0xb0 [ 2135.659431] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2135.660152] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2135.660859] do_syscall_64+0x33/0x40 [ 2135.661365] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2135.662068] RIP: 0033:0x7f29c20d1b19 [ 2135.662568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2135.665114] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2135.666139] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2135.667118] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2135.668108] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2135.669073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2135.670048] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2135.671063] CPU: 0 PID: 14168 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2135.672147] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2135.673574] Call Trace: [ 2135.673956] dump_stack+0x107/0x167 [ 2135.674482] should_fail.cold+0x5/0xa [ 2135.675024] ? create_object.isra.0+0x3a/0xa20 [ 2135.675630] should_failslab+0x5/0x20 [ 2135.676175] kmem_cache_alloc+0x5b/0x360 [ 2135.676749] create_object.isra.0+0x3a/0xa20 [ 2135.677373] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2135.678083] kmem_cache_alloc+0x159/0x360 [ 2135.678665] __skb_ext_alloc+0x19/0x90 [ 2135.679219] skb_ext_add+0x508/0x670 [ 2135.679751] ? __kmalloc_node_track_caller+0x306/0x3f0 [ 2135.680513] __alloc_skb+0x3c1/0x620 [ 2135.681051] netlink_dump+0x735/0x1050 [ 2135.681632] ? netlink_insert+0x1640/0x1640 [ 2135.682225] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2135.682918] ? lock_downgrade+0x6d0/0x6d0 [ 2135.683531] __netlink_dump_start+0x649/0x900 [ 2135.684164] rtnetlink_rcv_msg+0x72a/0xb10 [ 2135.684732] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2135.685324] ? rtnetlink_put_metrics+0x510/0x510 [ 2135.686014] ? ndo_dflt_fdb_dump+0x160/0x160 [ 2135.686614] ? lock_acquire+0x197/0x490 [ 2135.687143] ? netlink_deliver_tap+0xf4/0xc40 [ 2135.687739] netlink_rcv_skb+0x14b/0x430 [ 2135.688280] ? rtnetlink_put_metrics+0x510/0x510 [ 2135.688906] ? netlink_ack+0xab0/0xab0 [ 2135.689449] ? netlink_deliver_tap+0x1ae/0xc40 [ 2135.690084] ? netlink_deliver_tap+0x1c4/0xc40 [ 2135.690700] ? is_vmalloc_addr+0x7b/0xb0 [ 2135.691290] netlink_unicast+0x549/0x7f0 [ 2135.691877] ? netlink_attachskb+0x810/0x810 [ 2135.692566] netlink_sendmsg+0x905/0xdf0 [ 2135.693171] ? netlink_unicast+0x7f0/0x7f0 [ 2135.693806] ? netlink_unicast+0x7f0/0x7f0 [ 2135.694459] sock_sendmsg+0x154/0x190 [ 2135.695029] ____sys_sendmsg+0x70d/0x870 [ 2135.695616] ? kernel_sendmsg+0x50/0x50 [ 2135.696195] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2135.696886] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2135.697629] ? lock_downgrade+0x6d0/0x6d0 [ 2135.698230] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2135.699013] ? SOFTIRQ_verbose+0x10/0x10 [ 2135.699590] ___sys_sendmsg+0xf3/0x170 [ 2135.700211] ? sendmsg_copy_msghdr+0x160/0x160 [ 2135.700859] ? lock_downgrade+0x6d0/0x6d0 [ 2135.701446] ? find_held_lock+0x2c/0x110 [ 2135.702034] ? __fget_files+0x296/0x480 [ 2135.702627] ? __fget_light+0xea/0x290 [ 2135.703197] __sys_sendmsg+0xe5/0x1b0 [ 2135.703743] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2135.704400] ? rcu_read_lock_any_held+0x75/0xa0 [ 2135.705102] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2135.705844] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2135.706576] ? trace_hardirqs_on+0x5b/0x180 [ 2135.707199] do_syscall_64+0x33/0x40 [ 2135.707726] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2135.708477] RIP: 0033:0x7fe21efd1b19 [ 2135.709015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2135.711562] RSP: 002b:00007fe21c547188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2135.712637] RAX: ffffffffffffffda RBX: 00007fe21f0e4f60 RCX: 00007fe21efd1b19 [ 2135.713635] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 2135.714606] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2135.715596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2135.716635] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 09:24:22 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) (fail_nth: 16) dup3(0xffffffffffffffff, r1, 0x0) 09:24:22 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 18) 09:24:22 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:22 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 2135.994009] FAULT_INJECTION: forcing a failure. [ 2135.994009] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2135.995521] CPU: 0 PID: 14286 Comm: syz-executor.0 Not tainted 5.10.151 #1 [ 2135.996328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2135.997318] Call Trace: [ 2135.997631] dump_stack+0x107/0x167 [ 2135.998056] should_fail.cold+0x5/0xa [ 2135.998527] _copy_to_user+0x2e/0x180 [ 2135.998981] simple_read_from_buffer+0xcc/0x160 [ 2135.999525] proc_fail_nth_read+0x198/0x230 [ 2136.000040] ? proc_sessionid_read+0x230/0x230 [ 2136.000583] ? security_file_permission+0x24e/0x570 [ 2136.001167] ? perf_trace_initcall_start+0x101/0x380 [ 2136.001769] ? proc_sessionid_read+0x230/0x230 [ 2136.002298] vfs_read+0x228/0x580 [ 2136.002711] ksys_read+0x12d/0x260 [ 2136.003120] ? __ia32_sys_pwrite64+0x230/0x230 [ 2136.003662] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2136.004267] do_syscall_64+0x33/0x40 [ 2136.004705] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2136.005308] RIP: 0033:0x7fe21ef8469c [ 2136.005784] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2136.007935] RSP: 002b:00007fe21c547170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2136.008831] RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007fe21ef8469c [ 2136.009667] RDX: 000000000000000f RSI: 00007fe21c5471e0 RDI: 0000000000000006 [ 2136.010508] RBP: 00007fe21c5471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2136.011338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2136.012185] R13: 00007ffc231c975f R14: 00007fe21c547300 R15: 0000000000022000 [ 2136.025866] FAULT_INJECTION: forcing a failure. [ 2136.025866] name failslab, interval 1, probability 0, space 0, times 0 [ 2136.027317] CPU: 0 PID: 14288 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2136.028239] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2136.029217] Call Trace: [ 2136.029537] dump_stack+0x107/0x167 [ 2136.029967] should_fail.cold+0x5/0xa [ 2136.030427] ? jbd2__journal_start+0x190/0x890 [ 2136.030971] should_failslab+0x5/0x20 [ 2136.031419] kmem_cache_alloc+0x5b/0x360 [ 2136.031911] jbd2__journal_start+0x190/0x890 [ 2136.032453] __ext4_journal_start_sb+0x214/0x430 [ 2136.033005] ext4_iomap_begin+0x485/0x700 [ 2136.033502] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2136.034063] ? iomap_dio_rw+0x31/0x90 [ 2136.034520] ? vfs_write+0x747/0xa30 [ 2136.034950] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2136.035707] ? lock_chain_count+0x20/0x20 [ 2136.036212] iomap_apply+0x164/0x9e0 [ 2136.036651] ? iomap_dio_rw+0x90/0x90 [ 2136.037103] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2136.037783] ? mark_held_locks+0x9e/0xe0 [ 2136.038273] ? filemap_check_errors+0xa5/0x150 [ 2136.038806] __iomap_dio_rw+0x6cd/0x11a0 [ 2136.039274] ? iomap_dio_rw+0x90/0x90 [ 2136.039740] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2136.040280] ? ext4_orphan_add+0x253/0x9e0 [ 2136.040780] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2136.041330] ? ext4_empty_dir+0xae0/0xae0 [ 2136.041820] ? jbd2__journal_start+0xf3/0x890 [ 2136.042352] iomap_dio_rw+0x31/0x90 [ 2136.042789] ext4_file_write_iter+0xb26/0x18e0 [ 2136.043343] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2136.043892] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2136.044497] ? SOFTIRQ_verbose+0x10/0x10 [ 2136.044982] new_sync_write+0x42c/0x660 [ 2136.045439] ? new_sync_read+0x6f0/0x6f0 [ 2136.045918] ? ksys_write+0x12d/0x260 [ 2136.046370] ? lock_release+0x6b0/0x6b0 [ 2136.046850] ? selinux_file_permission+0x36/0x510 [ 2136.047423] ? __fget_files+0x296/0x480 [ 2136.047889] vfs_write+0x747/0xa30 [ 2136.048336] ksys_write+0x12d/0x260 [ 2136.048769] ? __ia32_sys_read+0xb0/0xb0 [ 2136.049245] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2136.049870] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2136.050475] do_syscall_64+0x33/0x40 [ 2136.050902] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2136.051510] RIP: 0033:0x7f29c20d1b19 [ 2136.051954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2136.054120] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2136.055001] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2136.055824] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2136.056667] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2136.057505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2136.058340] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:24:23 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2149.475723] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:24:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:24:46 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:46 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:24:46 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 19) 09:24:46 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:46 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2159.320428] perf: interrupt took too long (8129 > 8097), lowering kernel.perf_event_max_sample_rate to 24000 09:24:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:24:46 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2159.374773] FAULT_INJECTION: forcing a failure. [ 2159.374773] name failslab, interval 1, probability 0, space 0, times 0 [ 2159.377298] CPU: 0 PID: 14420 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2159.378622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2159.380286] Call Trace: [ 2159.380813] dump_stack+0x107/0x167 [ 2159.381518] should_fail.cold+0x5/0xa [ 2159.382253] ? ext4_find_extent+0xa3d/0xd30 [ 2159.383085] should_failslab+0x5/0x20 [ 2159.383822] __kmalloc+0x72/0x3f0 [ 2159.384528] ext4_find_extent+0xa3d/0xd30 [ 2159.385341] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2159.386227] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2159.387230] ? SOFTIRQ_verbose+0x10/0x10 [ 2159.388018] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2159.389047] ? SOFTIRQ_verbose+0x10/0x10 [ 2159.389844] ? ext4_ext_release+0x10/0x10 [ 2159.390655] ? lock_release+0x6b0/0x6b0 [ 2159.391423] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 2159.392398] ? lock_downgrade+0x6d0/0x6d0 [ 2159.393217] ? down_read+0x10f/0x430 [ 2159.393935] ? down_write_killable+0x180/0x180 [ 2159.394824] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2159.395761] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 2159.396693] ext4_map_blocks+0x9cc/0x1970 [ 2159.397515] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2159.398381] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2159.399307] ? jbd2__journal_start+0xf3/0x890 [ 2159.400194] ? __ext4_journal_start_sb+0x214/0x430 [ 2159.401177] ? __ext4_journal_start_sb+0x1db/0x430 [ 2159.402139] ext4_iomap_begin+0x3ad/0x700 [ 2159.402952] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2159.403889] ? iomap_dio_rw+0x31/0x90 [ 2159.404643] ? vfs_write+0x747/0xa30 [ 2159.405361] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2159.406580] ? lock_chain_count+0x20/0x20 [ 2159.407389] iomap_apply+0x164/0x9e0 [ 2159.408103] ? iomap_dio_rw+0x90/0x90 [ 2159.408884] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2159.409996] ? mark_held_locks+0x9e/0xe0 [ 2159.410800] ? filemap_check_errors+0xa5/0x150 [ 2159.411683] __iomap_dio_rw+0x6cd/0x11a0 [ 2159.412489] ? iomap_dio_rw+0x90/0x90 [ 2159.413244] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2159.414129] ? ext4_orphan_add+0x253/0x9e0 [ 2159.414946] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2159.415888] ? ext4_empty_dir+0xae0/0xae0 [ 2159.416702] ? jbd2__journal_start+0xf3/0x890 [ 2159.417573] iomap_dio_rw+0x31/0x90 [ 2159.418279] ext4_file_write_iter+0xb26/0x18e0 [ 2159.419177] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2159.420060] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2159.421109] ? SOFTIRQ_verbose+0x10/0x10 [ 2159.421903] new_sync_write+0x42c/0x660 [ 2159.422670] ? new_sync_read+0x6f0/0x6f0 [ 2159.423451] ? ksys_write+0x12d/0x260 [ 2159.424192] ? lock_release+0x6b0/0x6b0 [ 2159.424976] ? selinux_file_permission+0x36/0x510 [ 2159.425907] ? __fget_files+0x296/0x480 [ 2159.426689] vfs_write+0x747/0xa30 [ 2159.427381] ksys_write+0x12d/0x260 [ 2159.428085] ? __ia32_sys_read+0xb0/0xb0 [ 2159.428915] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2159.429927] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2159.430923] do_syscall_64+0x33/0x40 [ 2159.431639] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2159.432649] RIP: 0033:0x7f29c20d1b19 [ 2159.433369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2159.436895] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2159.438365] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2159.439727] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2159.441133] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2159.442503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2159.443870] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:24:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:24:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 20) 09:24:46 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:24:46 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2159.790140] FAULT_INJECTION: forcing a failure. [ 2159.790140] name failslab, interval 1, probability 0, space 0, times 0 [ 2159.793138] CPU: 1 PID: 14540 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2159.794718] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2159.796456] Call Trace: [ 2159.797020] dump_stack+0x107/0x167 [ 2159.797823] should_fail.cold+0x5/0xa [ 2159.798634] ? create_object.isra.0+0x3a/0xa20 [ 2159.799605] should_failslab+0x5/0x20 [ 2159.800419] kmem_cache_alloc+0x5b/0x360 [ 2159.801303] create_object.isra.0+0x3a/0xa20 [ 2159.802233] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2159.803299] __kmalloc+0x16e/0x3f0 [ 2159.804056] ext4_find_extent+0xa3d/0xd30 [ 2159.804959] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2159.805933] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2159.807018] ? SOFTIRQ_verbose+0x10/0x10 [ 2159.807869] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2159.808998] ? SOFTIRQ_verbose+0x10/0x10 [ 2159.809892] ? ext4_ext_release+0x10/0x10 [ 2159.810781] ? lock_release+0x6b0/0x6b0 [ 2159.811600] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 2159.812615] ? lock_downgrade+0x6d0/0x6d0 [ 2159.813496] ? down_read+0x10f/0x430 [ 2159.814291] ? down_write_killable+0x180/0x180 [ 2159.815313] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2159.816414] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 2159.817454] ext4_map_blocks+0x9cc/0x1970 [ 2159.818450] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2159.819495] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2159.820613] ? jbd2__journal_start+0xf3/0x890 [ 2159.821673] ? __ext4_journal_start_sb+0x214/0x430 [ 2159.822820] ? __ext4_journal_start_sb+0x1db/0x430 [ 2159.823963] ext4_iomap_begin+0x3ad/0x700 [ 2159.824936] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2159.826048] ? iomap_dio_rw+0x31/0x90 [ 2159.826919] ? vfs_write+0x747/0xa30 [ 2159.827789] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2159.829163] ? lock_chain_count+0x20/0x20 [ 2159.830136] iomap_apply+0x164/0x9e0 [ 2159.830974] ? iomap_dio_rw+0x90/0x90 [ 2159.831855] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2159.833129] ? mark_held_locks+0x9e/0xe0 [ 2159.834093] ? filemap_check_errors+0xa5/0x150 [ 2159.835118] __iomap_dio_rw+0x6cd/0x11a0 [ 2159.836008] ? iomap_dio_rw+0x90/0x90 [ 2159.836912] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2159.837940] ? ext4_orphan_add+0x253/0x9e0 [ 2159.838894] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2159.839957] ? ext4_empty_dir+0xae0/0xae0 [ 2159.840893] ? jbd2__journal_start+0xf3/0x890 [ 2159.841899] iomap_dio_rw+0x31/0x90 [ 2159.842735] ext4_file_write_iter+0xb26/0x18e0 [ 2159.843754] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2159.844830] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2159.845967] ? SOFTIRQ_verbose+0x10/0x10 [ 2159.846924] new_sync_write+0x42c/0x660 [ 2159.847807] ? new_sync_read+0x6f0/0x6f0 [ 2159.848744] ? ksys_write+0x12d/0x260 [ 2159.849563] ? lock_release+0x6b0/0x6b0 [ 2159.850459] ? selinux_file_permission+0x36/0x510 [ 2159.851522] ? __fget_files+0x296/0x480 [ 2159.852434] vfs_write+0x747/0xa30 [ 2159.853211] ksys_write+0x12d/0x260 [ 2159.854039] ? __ia32_sys_read+0xb0/0xb0 [ 2159.854949] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2159.856091] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2159.857236] do_syscall_64+0x33/0x40 [ 2159.858085] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2159.859202] RIP: 0033:0x7f29c20d1b19 [ 2159.860021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2159.864010] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2159.865705] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2159.867196] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2159.868789] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2159.870279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2159.871849] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2171.445731] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:25:05 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:25:05 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:25:05 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:05 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f0000000800030006000000080003000100"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 21) 09:25:05 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2179.181210] FAULT_INJECTION: forcing a failure. [ 2179.181210] name failslab, interval 1, probability 0, space 0, times 0 [ 2179.184305] CPU: 1 PID: 14664 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2179.185832] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2179.187623] Call Trace: [ 2179.188201] dump_stack+0x107/0x167 [ 2179.189028] should_fail.cold+0x5/0xa [ 2179.189860] ? __es_insert_extent+0x3a9/0x12f0 [ 2179.190851] should_failslab+0x5/0x20 [ 2179.191673] kmem_cache_alloc+0x5b/0x360 [ 2179.192606] __es_insert_extent+0x3a9/0x12f0 [ 2179.193565] ? do_raw_write_lock+0x11a/0x280 [ 2179.194520] ? do_raw_read_unlock+0x70/0x70 [ 2179.195474] ext4_es_insert_extent+0x2dc/0xbb0 [ 2179.196472] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2179.197429] ? lock_downgrade+0x6d0/0x6d0 [ 2179.198335] ? __ext4_handle_dirty_super+0x100/0x100 [ 2179.199429] ? __es_find_extent_range+0x197/0x4b0 [ 2179.200476] ? __ext4_handle_dirty_super+0x100/0x100 [ 2179.201613] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2179.202664] ext4_ext_map_blocks+0x194a/0x5b90 [ 2179.203671] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2179.204822] ? SOFTIRQ_verbose+0x10/0x10 [ 2179.205701] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2179.206827] ? SOFTIRQ_verbose+0x10/0x10 [ 2179.207717] ? ext4_ext_release+0x10/0x10 [ 2179.208660] ? lock_release+0x6b0/0x6b0 [ 2179.209531] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 2179.210553] ? lock_downgrade+0x6d0/0x6d0 [ 2179.211470] ? down_read+0x10f/0x430 [ 2179.212276] ? down_write_killable+0x180/0x180 [ 2179.213296] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2179.214339] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 2179.215360] ext4_map_blocks+0x9cc/0x1970 [ 2179.216271] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2179.217264] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2179.218307] ? jbd2__journal_start+0xf3/0x890 [ 2179.219288] ? __ext4_journal_start_sb+0x214/0x430 [ 2179.220344] ? __ext4_journal_start_sb+0x1db/0x430 [ 2179.221438] ext4_iomap_begin+0x3ad/0x700 [ 2179.222353] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2179.223412] ? iomap_dio_rw+0x31/0x90 [ 2179.224239] ? vfs_write+0x747/0xa30 [ 2179.225088] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2179.226448] ? lock_chain_count+0x20/0x20 [ 2179.227360] iomap_apply+0x164/0x9e0 [ 2179.228169] ? iomap_dio_rw+0x90/0x90 [ 2179.229121] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2179.230380] ? mark_held_locks+0x9e/0xe0 [ 2179.231285] ? filemap_check_errors+0xa5/0x150 [ 2179.232284] __iomap_dio_rw+0x6cd/0x11a0 [ 2179.233198] ? iomap_dio_rw+0x90/0x90 [ 2179.234050] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2179.235035] ? ext4_orphan_add+0x253/0x9e0 [ 2179.235950] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2179.237040] ? ext4_empty_dir+0xae0/0xae0 [ 2179.237934] ? jbd2__journal_start+0xf3/0x890 [ 2179.238916] iomap_dio_rw+0x31/0x90 [ 2179.239711] ext4_file_write_iter+0xb26/0x18e0 [ 2179.240750] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2179.241744] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2179.242873] ? SOFTIRQ_verbose+0x10/0x10 [ 2179.243765] new_sync_write+0x42c/0x660 [ 2179.244665] ? new_sync_read+0x6f0/0x6f0 [ 2179.245547] ? ksys_write+0x12d/0x260 [ 2179.246378] ? lock_release+0x6b0/0x6b0 [ 2179.247243] ? selinux_file_permission+0x36/0x510 [ 2179.248293] ? __fget_files+0x296/0x480 [ 2179.249194] vfs_write+0x747/0xa30 [ 2179.249979] ksys_write+0x12d/0x260 [ 2179.250771] ? __ia32_sys_read+0xb0/0xb0 [ 2179.251659] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2179.252819] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2179.253941] do_syscall_64+0x33/0x40 [ 2179.254749] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2179.255855] RIP: 0033:0x7f29c20d1b19 [ 2179.256695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2179.260668] RSP: 002b:00007f29bf626188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2179.262310] RAX: ffffffffffffffda RBX: 00007f29c21e5020 RCX: 00007f29c20d1b19 [ 2179.263844] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2179.265400] RBP: 00007f29bf6261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2179.266935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2179.268467] R13: 00007ffe4dc230af R14: 00007f29bf626300 R15: 0000000000022000 09:25:06 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 22) 09:25:06 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffff"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:06 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:06 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:06 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:25:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:25:06 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2179.626408] FAULT_INJECTION: forcing a failure. [ 2179.626408] name failslab, interval 1, probability 0, space 0, times 0 [ 2179.628908] CPU: 0 PID: 14684 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2179.630402] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2179.632186] Call Trace: [ 2179.632800] dump_stack+0x107/0x167 [ 2179.633599] should_fail.cold+0x5/0xa [ 2179.634430] ? create_object.isra.0+0x3a/0xa20 [ 2179.635423] should_failslab+0x5/0x20 [ 2179.636247] kmem_cache_alloc+0x5b/0x360 [ 2179.637155] create_object.isra.0+0x3a/0xa20 [ 2179.638104] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2179.639209] kmem_cache_alloc+0x159/0x360 [ 2179.640121] __es_insert_extent+0x3a9/0x12f0 [ 2179.641110] ? do_raw_write_lock+0x11a/0x280 [ 2179.642069] ? do_raw_read_unlock+0x70/0x70 [ 2179.643026] ext4_es_insert_extent+0x2dc/0xbb0 [ 2179.644028] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2179.644976] ? lock_downgrade+0x6d0/0x6d0 [ 2179.645889] ? __ext4_handle_dirty_super+0x100/0x100 [ 2179.646985] ? __es_find_extent_range+0x197/0x4b0 [ 2179.648039] ? __ext4_handle_dirty_super+0x100/0x100 [ 2179.649145] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2179.650196] ext4_ext_map_blocks+0x194a/0x5b90 [ 2179.651205] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2179.652335] ? SOFTIRQ_verbose+0x10/0x10 [ 2179.653237] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2179.654366] ? SOFTIRQ_verbose+0x10/0x10 [ 2179.655260] ? ext4_ext_release+0x10/0x10 [ 2179.656171] ? lock_release+0x6b0/0x6b0 [ 2179.657050] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 2179.658076] ? lock_downgrade+0x6d0/0x6d0 [ 2179.658992] ? down_read+0x10f/0x430 [ 2179.659801] ? down_write_killable+0x180/0x180 [ 2179.660812] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2179.661859] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 2179.662883] ext4_map_blocks+0x9cc/0x1970 [ 2179.663805] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2179.664790] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2179.665835] ? jbd2__journal_start+0xf3/0x890 [ 2179.666817] ? __ext4_journal_start_sb+0x214/0x430 [ 2179.667879] ? __ext4_journal_start_sb+0x1db/0x430 [ 2179.668958] ext4_iomap_begin+0x3ad/0x700 [ 2179.669875] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2179.670934] ? iomap_dio_rw+0x31/0x90 [ 2179.671760] ? vfs_write+0x747/0xa30 [ 2179.672596] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2179.673968] ? lock_chain_count+0x20/0x20 [ 2179.674883] iomap_apply+0x164/0x9e0 [ 2179.675692] ? iomap_dio_rw+0x90/0x90 [ 2179.676530] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2179.677795] ? mark_held_locks+0x9e/0xe0 [ 2179.678702] ? filemap_check_errors+0xa5/0x150 [ 2179.679701] __iomap_dio_rw+0x6cd/0x11a0 [ 2179.680609] ? iomap_dio_rw+0x90/0x90 [ 2179.681470] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2179.682460] ? ext4_orphan_add+0x253/0x9e0 [ 2179.683378] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2179.684445] ? ext4_empty_dir+0xae0/0xae0 [ 2179.685349] ? jbd2__journal_start+0xf3/0x890 [ 2179.686335] iomap_dio_rw+0x31/0x90 [ 2179.687130] ext4_file_write_iter+0xb26/0x18e0 [ 2179.688147] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2179.689166] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2179.690300] ? SOFTIRQ_verbose+0x10/0x10 [ 2179.691203] new_sync_write+0x42c/0x660 [ 2179.692072] ? new_sync_read+0x6f0/0x6f0 [ 2179.692981] ? ksys_write+0x12d/0x260 [ 2179.693819] ? lock_release+0x6b0/0x6b0 [ 2179.694690] ? selinux_file_permission+0x36/0x510 [ 2179.695747] ? __fget_files+0x296/0x480 [ 2179.696639] vfs_write+0x747/0xa30 [ 2179.697425] ksys_write+0x12d/0x260 [ 2179.698219] ? __ia32_sys_read+0xb0/0xb0 [ 2179.699112] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2179.700251] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2179.701383] do_syscall_64+0x33/0x40 [ 2179.702195] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2179.703306] RIP: 0033:0x7f29c20d1b19 [ 2179.704120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2179.708112] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2179.709774] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2179.711318] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2179.712874] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2179.714406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2179.715940] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2195.159646] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:25:30 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:25:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x9, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:25:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:30 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:30 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 23) 09:25:30 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:30 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xf, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2203.696925] FAULT_INJECTION: forcing a failure. [ 2203.696925] name failslab, interval 1, probability 0, space 0, times 0 [ 2203.699883] CPU: 1 PID: 14819 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2203.701466] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2203.703330] Call Trace: [ 2203.703937] dump_stack+0x107/0x167 [ 2203.704765] should_fail.cold+0x5/0xa [ 2203.705619] ? ext4_find_extent+0xa3d/0xd30 [ 2203.706602] should_failslab+0x5/0x20 [ 2203.707452] __kmalloc+0x72/0x3f0 [ 2203.708248] ext4_find_extent+0xa3d/0xd30 [ 2203.709199] ? kfree+0xd7/0x390 [ 2203.709979] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2203.710997] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2203.712164] ? SOFTIRQ_verbose+0x10/0x10 [ 2203.713085] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2203.714264] ? SOFTIRQ_verbose+0x10/0x10 [ 2203.715182] ? ext4_ext_release+0x10/0x10 [ 2203.716116] ? ext4_map_blocks+0x5e0/0x1970 [ 2203.717104] ? lock_release+0x6b0/0x6b0 [ 2203.718022] ? find_held_lock+0x2c/0x110 [ 2203.718933] ? down_write+0xe0/0x160 [ 2203.719745] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2203.720862] ext4_map_blocks+0x652/0x1970 [ 2203.721836] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2203.722829] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2203.723885] ? jbd2__journal_start+0xf3/0x890 [ 2203.724929] ? __ext4_journal_start_sb+0x214/0x430 [ 2203.726087] ? __ext4_journal_start_sb+0x1db/0x430 [ 2203.727229] ext4_iomap_begin+0x3ad/0x700 [ 2203.728155] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2203.729231] ? iomap_dio_rw+0x31/0x90 [ 2203.730077] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2203.731456] ? lock_chain_count+0x20/0x20 [ 2203.732379] iomap_apply+0x164/0x9e0 [ 2203.733217] ? iomap_dio_rw+0x90/0x90 [ 2203.734056] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2203.735329] ? mark_held_locks+0x9e/0xe0 [ 2203.736242] ? filemap_check_errors+0xa5/0x150 [ 2203.737257] __iomap_dio_rw+0x6cd/0x11a0 [ 2203.738140] ? iomap_dio_rw+0x90/0x90 [ 2203.738996] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2203.739984] ? ext4_orphan_add+0x253/0x9e0 [ 2203.740915] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2203.741988] ? ext4_empty_dir+0xae0/0xae0 [ 2203.742887] ? jbd2__journal_start+0xf3/0x890 [ 2203.743917] iomap_dio_rw+0x31/0x90 [ 2203.744718] ext4_file_write_iter+0xb26/0x18e0 [ 2203.745765] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2203.746764] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2203.747905] ? SOFTIRQ_verbose+0x10/0x10 [ 2203.748805] new_sync_write+0x42c/0x660 [ 2203.749683] ? new_sync_read+0x6f0/0x6f0 [ 2203.750573] ? ksys_write+0x12d/0x260 [ 2203.751411] ? lock_release+0x6b0/0x6b0 [ 2203.752297] ? selinux_file_permission+0x36/0x510 [ 2203.753369] ? __fget_files+0x296/0x480 [ 2203.754254] vfs_write+0x747/0xa30 [ 2203.755047] ksys_write+0x12d/0x260 [ 2203.755844] ? __ia32_sys_read+0xb0/0xb0 [ 2203.756733] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2203.757906] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2203.759041] do_syscall_64+0x33/0x40 [ 2203.759860] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2203.760988] RIP: 0033:0x7f29c20d1b19 [ 2203.761803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2203.765808] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2203.767470] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2203.769041] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2203.770868] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2203.772807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2203.774764] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:25:30 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 24) 09:25:30 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:25:30 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:30 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:31 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2204.206081] FAULT_INJECTION: forcing a failure. [ 2204.206081] name failslab, interval 1, probability 0, space 0, times 0 [ 2204.208645] CPU: 1 PID: 14841 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2204.210187] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2204.212007] Call Trace: [ 2204.212602] dump_stack+0x107/0x167 [ 2204.213423] should_fail.cold+0x5/0xa [ 2204.214280] ? create_object.isra.0+0x3a/0xa20 [ 2204.215295] should_failslab+0x5/0x20 [ 2204.216131] kmem_cache_alloc+0x5b/0x360 [ 2204.217040] create_object.isra.0+0x3a/0xa20 [ 2204.218017] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2204.219140] __kmalloc+0x16e/0x3f0 [ 2204.219950] ext4_find_extent+0xa3d/0xd30 [ 2204.220881] ? kfree+0xd7/0x390 [ 2204.221630] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2204.222644] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2204.223801] ? SOFTIRQ_verbose+0x10/0x10 [ 2204.224690] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2204.225854] ? SOFTIRQ_verbose+0x10/0x10 [ 2204.226756] ? ext4_ext_release+0x10/0x10 [ 2204.227672] ? ext4_map_blocks+0x5e0/0x1970 [ 2204.228623] ? lock_release+0x6b0/0x6b0 [ 2204.229508] ? find_held_lock+0x2c/0x110 [ 2204.230419] ? down_write+0xe0/0x160 [ 2204.231240] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2204.232352] ext4_map_blocks+0x652/0x1970 [ 2204.233299] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2204.234289] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2204.235350] ? jbd2__journal_start+0xf3/0x890 [ 2204.236354] ? __ext4_journal_start_sb+0x214/0x430 [ 2204.237465] ? __ext4_journal_start_sb+0x1db/0x430 [ 2204.238550] ext4_iomap_begin+0x3ad/0x700 [ 2204.239481] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2204.240553] ? iomap_dio_rw+0x31/0x90 [ 2204.241418] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2204.242800] ? lock_chain_count+0x20/0x20 [ 2204.243728] iomap_apply+0x164/0x9e0 [ 2204.244542] ? iomap_dio_rw+0x90/0x90 [ 2204.245392] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2204.246664] ? mark_held_locks+0x9e/0xe0 [ 2204.247579] ? filemap_check_errors+0xa5/0x150 [ 2204.248588] __iomap_dio_rw+0x6cd/0x11a0 [ 2204.249479] ? iomap_dio_rw+0x90/0x90 [ 2204.250350] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2204.251353] ? ext4_orphan_add+0x253/0x9e0 [ 2204.252282] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2204.253367] ? ext4_empty_dir+0xae0/0xae0 [ 2204.254278] ? jbd2__journal_start+0xf3/0x890 [ 2204.255281] iomap_dio_rw+0x31/0x90 [ 2204.256088] ext4_file_write_iter+0xb26/0x18e0 [ 2204.257126] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2204.258139] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2204.259286] ? SOFTIRQ_verbose+0x10/0x10 [ 2204.260193] new_sync_write+0x42c/0x660 [ 2204.261076] ? new_sync_read+0x6f0/0x6f0 [ 2204.261972] ? ksys_write+0x12d/0x260 [ 2204.262812] ? lock_release+0x6b0/0x6b0 [ 2204.263690] ? selinux_file_permission+0x36/0x510 [ 2204.264757] ? __fget_files+0x296/0x480 [ 2204.265664] vfs_write+0x747/0xa30 [ 2204.266464] ksys_write+0x12d/0x260 [ 2204.267268] ? __ia32_sys_read+0xb0/0xb0 [ 2204.268169] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2204.269332] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2204.270473] do_syscall_64+0x33/0x40 [ 2204.271293] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2204.272415] RIP: 0033:0x7f29c20d1b19 [ 2204.273248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2204.277277] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2204.278959] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2204.280516] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2204.282085] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2204.283642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2204.285221] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2219.010270] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:25:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:25:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xf0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:25:53 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:53 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 25) 09:25:53 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:53 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), 0x0, 0x0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2226.990538] FAULT_INJECTION: forcing a failure. [ 2226.990538] name failslab, interval 1, probability 0, space 0, times 0 [ 2226.993049] CPU: 1 PID: 14975 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2226.994593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2226.996395] Call Trace: [ 2226.996983] dump_stack+0x107/0x167 [ 2226.997813] should_fail.cold+0x5/0xa [ 2226.998648] ? create_object.isra.0+0x3a/0xa20 [ 2226.999658] should_failslab+0x5/0x20 [ 2227.000491] kmem_cache_alloc+0x5b/0x360 [ 2227.001407] create_object.isra.0+0x3a/0xa20 [ 2227.002373] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2227.003490] __kmalloc+0x16e/0x3f0 [ 2227.004284] ext4_find_extent+0xa3d/0xd30 [ 2227.005201] ? kfree+0xd7/0x390 [ 2227.005944] ext4_ext_map_blocks+0x1c8/0x5b90 [ 2227.007271] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2227.008416] ? SOFTIRQ_verbose+0x10/0x10 [ 2227.009308] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2227.010437] ? SOFTIRQ_verbose+0x10/0x10 [ 2227.011328] ? ext4_ext_release+0x10/0x10 [ 2227.012234] ? ext4_map_blocks+0x5e0/0x1970 [ 2227.013185] ? lock_release+0x6b0/0x6b0 [ 2227.014056] ? find_held_lock+0x2c/0x110 [ 2227.014959] ? down_write+0xe0/0x160 [ 2227.015948] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2227.017206] ext4_map_blocks+0x652/0x1970 [ 2227.018250] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2227.019393] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2227.020550] ? jbd2__journal_start+0xf3/0x890 [ 2227.021541] ? __ext4_journal_start_sb+0x214/0x430 [ 2227.022599] ? __ext4_journal_start_sb+0x1db/0x430 [ 2227.023667] ext4_iomap_begin+0x3ad/0x700 [ 2227.024581] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2227.025678] ? iomap_dio_rw+0x31/0x90 [ 2227.026513] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2227.027882] ? lock_chain_count+0x20/0x20 [ 2227.028795] iomap_apply+0x164/0x9e0 [ 2227.029607] ? iomap_dio_rw+0x90/0x90 [ 2227.030435] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2227.031695] ? mark_held_locks+0x9e/0xe0 [ 2227.032597] ? filemap_check_errors+0xa5/0x150 [ 2227.033606] __iomap_dio_rw+0x6cd/0x11a0 [ 2227.034485] ? iomap_dio_rw+0x90/0x90 [ 2227.035341] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2227.036334] ? ext4_orphan_add+0x253/0x9e0 [ 2227.037273] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2227.038336] ? ext4_empty_dir+0xae0/0xae0 [ 2227.039231] ? jbd2__journal_start+0xf3/0x890 [ 2227.040215] iomap_dio_rw+0x31/0x90 [ 2227.041011] ext4_file_write_iter+0xb26/0x18e0 [ 2227.042037] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2227.043031] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2227.044159] ? SOFTIRQ_verbose+0x10/0x10 [ 2227.045051] new_sync_write+0x42c/0x660 [ 2227.045932] ? new_sync_read+0x6f0/0x6f0 [ 2227.046812] ? ksys_write+0x12d/0x260 [ 2227.047644] ? lock_release+0x6b0/0x6b0 [ 2227.048507] ? selinux_file_permission+0x36/0x510 [ 2227.049566] ? __fget_files+0x296/0x480 [ 2227.050442] vfs_write+0x747/0xa30 [ 2227.051223] ksys_write+0x12d/0x260 [ 2227.052015] ? __ia32_sys_read+0xb0/0xb0 [ 2227.052900] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2227.054053] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2227.055176] do_syscall_64+0x33/0x40 [ 2227.055983] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2227.057093] RIP: 0033:0x7f29c20d1b19 [ 2227.057915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2227.061899] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2227.063543] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2227.065086] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2227.066646] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2227.068189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2227.069738] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:25:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x112, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:25:54 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:54 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:25:54 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), 0x0, 0x0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 26) 09:25:54 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:25:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:54 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2227.544834] FAULT_INJECTION: forcing a failure. [ 2227.544834] name failslab, interval 1, probability 0, space 0, times 0 [ 2227.546624] CPU: 0 PID: 15000 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2227.547657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2227.548909] Call Trace: [ 2227.549323] dump_stack+0x107/0x167 [ 2227.549864] should_fail.cold+0x5/0xa [ 2227.550433] ? create_object.isra.0+0x3a/0xa20 [ 2227.551125] should_failslab+0x5/0x20 [ 2227.551699] kmem_cache_alloc+0x5b/0x360 [ 2227.552327] create_object.isra.0+0x3a/0xa20 [ 2227.552975] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2227.553777] kmem_cache_alloc+0x159/0x360 [ 2227.554401] ext4_mb_new_blocks+0x64d/0x4890 [ 2227.555087] ? kasan_unpoison_shadow+0x33/0x50 [ 2227.555757] ? ext4_cache_extents+0x68/0x2d0 [ 2227.556425] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2227.557192] ? ext4_discard_preallocations+0xe10/0xe10 [ 2227.558001] ? ext4_ext_search_right+0x2e3/0xbd0 [ 2227.558699] ? ext4_inode_to_goal_block+0x320/0x430 [ 2227.559475] ext4_ext_map_blocks+0x1ec4/0x5b90 [ 2227.560169] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2227.560956] ? SOFTIRQ_verbose+0x10/0x10 [ 2227.561574] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2227.562365] ? SOFTIRQ_verbose+0x10/0x10 [ 2227.562962] ? ext4_ext_release+0x10/0x10 [ 2227.563571] ? ext4_map_blocks+0x5e0/0x1970 [ 2227.564222] ? lock_release+0x6b0/0x6b0 [ 2227.564809] ? find_held_lock+0x2c/0x110 [ 2227.565459] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2227.566202] ext4_map_blocks+0x652/0x1970 [ 2227.566831] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2227.567483] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2227.568206] ? jbd2__journal_start+0xf3/0x890 [ 2227.568860] ? __ext4_journal_start_sb+0x214/0x430 [ 2227.569633] ? __ext4_journal_start_sb+0x1db/0x430 [ 2227.570359] ext4_iomap_begin+0x3ad/0x700 [ 2227.570996] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2227.571723] ? iomap_dio_rw+0x31/0x90 [ 2227.572305] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2227.573254] ? lock_chain_count+0x20/0x20 [ 2227.573868] iomap_apply+0x164/0x9e0 [ 2227.574412] ? iomap_dio_rw+0x90/0x90 [ 2227.574976] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2227.575842] ? mark_held_locks+0x9e/0xe0 [ 2227.576444] ? filemap_check_errors+0xa5/0x150 [ 2227.577132] __iomap_dio_rw+0x6cd/0x11a0 [ 2227.577745] ? iomap_dio_rw+0x90/0x90 [ 2227.578325] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2227.578986] ? ext4_orphan_add+0x253/0x9e0 [ 2227.579625] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2227.580340] ? ext4_empty_dir+0xae0/0xae0 [ 2227.580963] ? jbd2__journal_start+0xf3/0x890 [ 2227.581860] iomap_dio_rw+0x31/0x90 [ 2227.582393] ext4_file_write_iter+0xb26/0x18e0 [ 2227.583114] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2227.583785] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2227.584587] ? SOFTIRQ_verbose+0x10/0x10 [ 2227.585198] new_sync_write+0x42c/0x660 [ 2227.585802] ? new_sync_read+0x6f0/0x6f0 [ 2227.586385] ? ksys_write+0x12d/0x260 [ 2227.586937] ? lock_release+0x6b0/0x6b0 [ 2227.587506] ? selinux_file_permission+0x36/0x510 [ 2227.588210] ? __fget_files+0x296/0x480 [ 2227.588785] vfs_write+0x747/0xa30 [ 2227.589333] ksys_write+0x12d/0x260 [ 2227.589854] ? __ia32_sys_read+0xb0/0xb0 [ 2227.590449] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2227.591213] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2227.591965] do_syscall_64+0x33/0x40 [ 2227.592493] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2227.593246] RIP: 0033:0x7f29c20d1b19 [ 2227.593779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2227.596392] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2227.597499] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2227.598505] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2227.599536] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2227.600548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2227.601628] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:26:08 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), 0x0, 0x0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x300, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:26:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:26:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:26:08 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:26:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 27) 09:26:08 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:08 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x900, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2241.803375] FAULT_INJECTION: forcing a failure. [ 2241.803375] name failslab, interval 1, probability 0, space 0, times 0 [ 2241.806362] CPU: 0 PID: 15123 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2241.807887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2241.809737] Call Trace: [ 2241.810329] dump_stack+0x107/0x167 [ 2241.811143] should_fail.cold+0x5/0xa [ 2241.811988] ? __es_insert_extent+0x3a9/0x12f0 [ 2241.813003] should_failslab+0x5/0x20 [ 2241.813854] kmem_cache_alloc+0x5b/0x360 [ 2241.814757] __es_insert_extent+0x3a9/0x12f0 [ 2241.815753] ext4_es_insert_extent+0x2dc/0xbb0 [ 2241.816765] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2241.817758] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2241.818870] ext4_map_blocks+0x8e1/0x1970 [ 2241.819797] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2241.820782] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2241.821851] ? jbd2__journal_start+0xf3/0x890 [ 2241.822843] ? __ext4_journal_start_sb+0x214/0x430 [ 2241.823915] ? __ext4_journal_start_sb+0x1db/0x430 [ 2241.825001] ext4_iomap_begin+0x3ad/0x700 [ 2241.825956] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2241.827034] ? iomap_dio_rw+0x31/0x90 [ 2241.827884] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2241.829268] ? lock_chain_count+0x20/0x20 [ 2241.830211] iomap_apply+0x164/0x9e0 [ 2241.831027] ? iomap_dio_rw+0x90/0x90 [ 2241.831866] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2241.833146] ? mark_held_locks+0x9e/0xe0 [ 2241.834086] ? filemap_check_errors+0xa5/0x150 [ 2241.835100] __iomap_dio_rw+0x6cd/0x11a0 [ 2241.835982] ? iomap_dio_rw+0x90/0x90 [ 2241.836844] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2241.837851] ? ext4_orphan_add+0x253/0x9e0 [ 2241.838778] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2241.839849] ? ext4_empty_dir+0xae0/0xae0 [ 2241.840755] ? jbd2__journal_start+0xf3/0x890 [ 2241.841775] iomap_dio_rw+0x31/0x90 [ 2241.842583] ext4_file_write_iter+0xb26/0x18e0 [ 2241.843645] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2241.844656] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2241.845812] ? SOFTIRQ_verbose+0x10/0x10 [ 2241.846716] new_sync_write+0x42c/0x660 [ 2241.847593] ? new_sync_read+0x6f0/0x6f0 [ 2241.848485] ? ksys_write+0x12d/0x260 [ 2241.849329] ? lock_release+0x6b0/0x6b0 [ 2241.850193] ? selinux_file_permission+0x36/0x510 [ 2241.851254] ? __fget_files+0x296/0x480 [ 2241.852126] vfs_write+0x747/0xa30 [ 2241.852916] ksys_write+0x12d/0x260 [ 2241.853735] ? __ia32_sys_read+0xb0/0xb0 [ 2241.854636] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2241.855790] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2241.856930] do_syscall_64+0x33/0x40 [ 2241.857757] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2241.858883] RIP: 0033:0x7f29c20d1b19 [ 2241.859698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2241.863723] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2241.865409] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2241.866974] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2241.868525] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2241.870092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2241.871645] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:26:08 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:26:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:26:09 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:09 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 28) 09:26:09 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:26:09 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2242.318400] FAULT_INJECTION: forcing a failure. [ 2242.318400] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.320806] CPU: 0 PID: 15246 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2242.322225] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2242.323811] Call Trace: [ 2242.324331] dump_stack+0x107/0x167 [ 2242.325036] should_fail.cold+0x5/0xa [ 2242.325787] ? __es_insert_extent+0x3a9/0x12f0 [ 2242.326668] should_failslab+0x5/0x20 [ 2242.327399] kmem_cache_alloc+0x5b/0x360 [ 2242.328195] __es_insert_extent+0x3a9/0x12f0 [ 2242.329071] ext4_es_insert_extent+0x2dc/0xbb0 [ 2242.330014] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2242.330865] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2242.331838] ext4_map_blocks+0x8e1/0x1970 [ 2242.332650] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2242.333540] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2242.334470] ? jbd2__journal_start+0xf3/0x890 [ 2242.335348] ? __ext4_journal_start_sb+0x214/0x430 [ 2242.336292] ? __ext4_journal_start_sb+0x1db/0x430 [ 2242.337241] ext4_iomap_begin+0x3ad/0x700 [ 2242.338070] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2242.339010] ? iomap_dio_rw+0x31/0x90 [ 2242.339753] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2242.340970] ? lock_chain_count+0x20/0x20 [ 2242.341796] iomap_apply+0x164/0x9e0 [ 2242.342509] ? iomap_dio_rw+0x90/0x90 [ 2242.343245] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2242.344360] ? mark_held_locks+0x9e/0xe0 [ 2242.345163] ? filemap_check_errors+0xa5/0x150 [ 2242.346072] __iomap_dio_rw+0x6cd/0x11a0 [ 2242.346848] ? iomap_dio_rw+0x90/0x90 [ 2242.347615] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2242.348490] ? ext4_orphan_add+0x253/0x9e0 [ 2242.349306] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2242.350255] ? ext4_empty_dir+0xae0/0xae0 [ 2242.351049] ? jbd2__journal_start+0xf3/0x890 [ 2242.351921] iomap_dio_rw+0x31/0x90 [ 2242.352627] ext4_file_write_iter+0xb26/0x18e0 [ 2242.353539] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2242.354423] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2242.355425] ? SOFTIRQ_verbose+0x10/0x10 [ 2242.356218] new_sync_write+0x42c/0x660 [ 2242.356983] ? new_sync_read+0x6f0/0x6f0 [ 2242.357787] ? ksys_write+0x12d/0x260 [ 2242.358524] ? lock_release+0x6b0/0x6b0 [ 2242.359316] ? selinux_file_permission+0x36/0x510 [ 2242.360251] ? __fget_files+0x296/0x480 [ 2242.361030] vfs_write+0x747/0xa30 [ 2242.361732] ksys_write+0x12d/0x260 [ 2242.362433] ? __ia32_sys_read+0xb0/0xb0 [ 2242.363220] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2242.364235] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2242.365233] do_syscall_64+0x33/0x40 [ 2242.365976] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2242.366957] RIP: 0033:0x7f29c20d1b19 [ 2242.367678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2242.371195] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2242.372678] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2242.374052] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2242.375437] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2242.376794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2242.378174] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2242.446667] perf: interrupt took too long (10167 > 10161), lowering kernel.perf_event_max_sample_rate to 19000 [ 2256.817089] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:26:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xec0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:26:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:26:31 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:26:31 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:31 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c00000800"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 29) 09:26:31 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:31 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:26:31 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 2264.550135] FAULT_INJECTION: forcing a failure. [ 2264.550135] name failslab, interval 1, probability 0, space 0, times 0 [ 2264.553455] CPU: 1 PID: 15371 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2264.554937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2264.556643] Call Trace: [ 2264.557191] dump_stack+0x107/0x167 [ 2264.557963] should_fail.cold+0x5/0xa [ 2264.558867] ? jbd2__journal_start+0x190/0x890 [ 2264.559848] should_failslab+0x5/0x20 [ 2264.560635] kmem_cache_alloc+0x5b/0x360 [ 2264.561475] jbd2__journal_start+0x190/0x890 [ 2264.562490] __ext4_journal_start_sb+0x214/0x430 [ 2264.563536] ext4_truncate+0x665/0x12b0 [ 2264.564468] ? ext4_punch_hole+0x1110/0x1110 [ 2264.565363] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2264.566441] ext4_file_write_iter+0x13a5/0x18e0 [ 2264.567410] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2264.568349] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2264.569410] ? SOFTIRQ_verbose+0x10/0x10 [ 2264.570322] new_sync_write+0x42c/0x660 [ 2264.571136] ? new_sync_read+0x6f0/0x6f0 [ 2264.571962] ? ksys_write+0x12d/0x260 [ 2264.572826] ? lock_release+0x6b0/0x6b0 [ 2264.573770] ? selinux_file_permission+0x36/0x510 [ 2264.574786] ? __fget_files+0x296/0x480 [ 2264.575607] vfs_write+0x747/0xa30 [ 2264.576337] ksys_write+0x12d/0x260 [ 2264.577076] ? __ia32_sys_read+0xb0/0xb0 [ 2264.577969] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2264.579035] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2264.580083] do_syscall_64+0x33/0x40 [ 2264.580839] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2264.581927] RIP: 0033:0x7f29c20d1b19 [ 2264.582684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2264.586620] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2264.588228] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2264.589926] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2264.591400] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2264.592920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2264.594454] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:26:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xf00, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:26:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:26:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 30) 09:26:31 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:26:31 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f0000000800030006000000080003000100"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:31 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:31 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c00000800"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x1201, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2265.015010] FAULT_INJECTION: forcing a failure. [ 2265.015010] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.017368] CPU: 0 PID: 15498 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2265.018811] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2265.020515] Call Trace: [ 2265.021066] dump_stack+0x107/0x167 [ 2265.021825] should_fail.cold+0x5/0xa [ 2265.022613] ? jbd2__journal_start+0x190/0x890 [ 2265.023560] should_failslab+0x5/0x20 [ 2265.024340] kmem_cache_alloc+0x5b/0x360 [ 2265.025210] jbd2__journal_start+0x190/0x890 [ 2265.026153] __ext4_journal_start_sb+0x214/0x430 [ 2265.027140] ext4_truncate+0x665/0x12b0 [ 2265.027959] ? ext4_punch_hole+0x1110/0x1110 [ 2265.028857] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2265.029908] ext4_file_write_iter+0x13a5/0x18e0 [ 2265.030889] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2265.031823] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2265.032892] ? SOFTIRQ_verbose+0x10/0x10 [ 2265.033737] new_sync_write+0x42c/0x660 [ 2265.034553] ? new_sync_read+0x6f0/0x6f0 [ 2265.035397] ? ksys_write+0x12d/0x260 [ 2265.036174] ? lock_release+0x6b0/0x6b0 [ 2265.036990] ? selinux_file_permission+0x36/0x510 [ 2265.038001] ? __fget_files+0x296/0x480 [ 2265.038825] vfs_write+0x747/0xa30 [ 2265.039558] ksys_write+0x12d/0x260 [ 2265.040309] ? __ia32_sys_read+0xb0/0xb0 [ 2265.041149] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2265.042239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2265.043290] do_syscall_64+0x33/0x40 [ 2265.044054] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2265.045093] RIP: 0033:0x7f29c20d1b19 [ 2265.045857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2265.049580] RSP: 002b:00007f29bf626188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2265.051144] RAX: ffffffffffffffda RBX: 00007f29c21e5020 RCX: 00007f29c20d1b19 [ 2265.052592] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2265.054044] RBP: 00007f29bf6261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2265.055722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2265.057528] R13: 00007ffe4dc230af R14: 00007f29bf626300 R15: 0000000000022000 [ 2278.660530] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:26:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xc00e, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:26:54 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:26:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 31) 09:26:54 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:26:54 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:54 executing program 7: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:54 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2287.162178] FAULT_INJECTION: forcing a failure. [ 2287.162178] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.164698] CPU: 1 PID: 15518 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2287.166215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2287.168131] Call Trace: [ 2287.168741] dump_stack+0x107/0x167 [ 2287.169545] should_fail.cold+0x5/0xa [ 2287.170394] ? jbd2__journal_start+0x190/0x890 [ 2287.171579] should_failslab+0x5/0x20 [ 2287.172409] kmem_cache_alloc+0x5b/0x360 [ 2287.173304] jbd2__journal_start+0x190/0x890 [ 2287.174286] __ext4_journal_start_sb+0x214/0x430 [ 2287.175341] ext4_truncate+0x665/0x12b0 [ 2287.176224] ? ext4_punch_hole+0x1110/0x1110 [ 2287.177180] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2287.178300] ext4_file_write_iter+0x13a5/0x18e0 [ 2287.179350] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2287.180362] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2287.181503] ? SOFTIRQ_verbose+0x10/0x10 [ 2287.182415] new_sync_write+0x42c/0x660 [ 2287.183299] ? new_sync_read+0x6f0/0x6f0 [ 2287.184194] ? ksys_write+0x12d/0x260 [ 2287.185043] ? lock_release+0x6b0/0x6b0 [ 2287.185922] ? selinux_file_permission+0x36/0x510 [ 2287.187017] ? __fget_files+0x296/0x480 [ 2287.187923] vfs_write+0x747/0xa30 [ 2287.188793] ksys_write+0x12d/0x260 [ 2287.189699] ? __ia32_sys_read+0xb0/0xb0 [ 2287.190690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2287.191916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2287.193230] do_syscall_64+0x33/0x40 [ 2287.194118] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2287.195246] RIP: 0033:0x7f29c20d1b19 [ 2287.196139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2287.200615] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2287.202388] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2287.204094] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2287.205786] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2287.207517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2287.209172] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:26:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xf000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:26:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:26:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 32) 09:26:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xff00, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:26:54 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c0000080001002000000008"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:26:54 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2287.700832] FAULT_INJECTION: forcing a failure. [ 2287.700832] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.703927] CPU: 0 PID: 15642 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2287.705417] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2287.707230] Call Trace: [ 2287.707809] dump_stack+0x107/0x167 [ 2287.708601] should_fail.cold+0x5/0xa [ 2287.709426] ? create_object.isra.0+0x3a/0xa20 [ 2287.710430] should_failslab+0x5/0x20 [ 2287.711253] kmem_cache_alloc+0x5b/0x360 [ 2287.712131] ? __kasan_slab_free+0x122/0x160 [ 2287.713095] create_object.isra.0+0x3a/0xa20 [ 2287.714089] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2287.715199] __kmalloc+0x16e/0x3f0 [ 2287.715993] ext4_ext_remove_space+0x15af/0x4010 [ 2287.717045] ? find_held_lock+0x2c/0x110 [ 2287.717950] ? do_raw_write_lock+0x11a/0x280 [ 2287.718925] ? do_raw_read_unlock+0x70/0x70 [ 2287.719875] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2287.721061] ? ext4_es_remove_extent+0x103/0x3f0 [ 2287.722124] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 2287.723156] ? down_write+0xe0/0x160 [ 2287.723970] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2287.725066] ext4_ext_truncate+0x1ea/0x250 [ 2287.726001] ext4_truncate+0xd5e/0x12b0 [ 2287.726881] ? ext4_punch_hole+0x1110/0x1110 [ 2287.727836] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2287.728944] ext4_file_write_iter+0x13a5/0x18e0 [ 2287.730014] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2287.731023] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2287.732162] ? SOFTIRQ_verbose+0x10/0x10 [ 2287.733062] new_sync_write+0x42c/0x660 [ 2287.733933] ? new_sync_read+0x6f0/0x6f0 [ 2287.734825] ? ksys_write+0x12d/0x260 [ 2287.735677] ? lock_release+0x6b0/0x6b0 [ 2287.736552] ? selinux_file_permission+0x36/0x510 [ 2287.737621] ? __fget_files+0x296/0x480 [ 2287.738519] vfs_write+0x747/0xa30 [ 2287.739311] ksys_write+0x12d/0x260 [ 2287.740114] ? __ia32_sys_read+0xb0/0xb0 [ 2287.741004] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2287.742182] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2287.743323] do_syscall_64+0x33/0x40 [ 2287.744137] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2287.745252] RIP: 0033:0x7f29c20d1b19 [ 2287.746078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2287.750064] RSP: 002b:00007f29bf647188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2287.751724] RAX: ffffffffffffffda RBX: 00007f29c21e4f60 RCX: 00007f29c20d1b19 [ 2287.753276] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2287.754849] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2287.756394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2287.757945] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 [ 2302.154401] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:27:17 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:17 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:17 executing program 7: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:17 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:17 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:27:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x34000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:27:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:27:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 33) 09:27:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x80000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2310.991928] FAULT_INJECTION: forcing a failure. [ 2310.991928] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2310.994502] CPU: 0 PID: 15669 Comm: syz-executor.5 Not tainted 5.10.151 #1 [ 2310.996004] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2310.997805] Call Trace: [ 2310.998396] dump_stack+0x107/0x167 [ 2310.999203] should_fail.cold+0x5/0xa [ 2311.000044] _copy_to_user+0x2e/0x180 [ 2311.000888] simple_read_from_buffer+0xcc/0x160 [ 2311.001899] proc_fail_nth_read+0x198/0x230 [ 2311.002871] ? proc_sessionid_read+0x230/0x230 [ 2311.003863] ? security_file_permission+0x24e/0x570 [ 2311.004948] ? perf_trace_initcall_start+0x101/0x380 [ 2311.006065] ? proc_sessionid_read+0x230/0x230 [ 2311.007082] vfs_read+0x228/0x580 [ 2311.007850] ksys_read+0x12d/0x260 [ 2311.008656] ? __ia32_sys_pwrite64+0x230/0x230 [ 2311.009645] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2311.010804] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2311.011937] do_syscall_64+0x33/0x40 [ 2311.012759] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2311.013886] RIP: 0033:0x7f29c208469c [ 2311.014711] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2311.018738] RSP: 002b:00007f29bf647170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2311.020387] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f29c208469c [ 2311.021969] RDX: 000000000000000f RSI: 00007f29bf6471e0 RDI: 0000000000000005 [ 2311.023521] RBP: 00007f29bf6471d0 R08: 0000000000000000 R09: 0000000000000000 [ 2311.025062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2311.026615] R13: 00007ffe4dc230af R14: 00007f29bf647300 R15: 0000000000022000 09:27:17 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:27:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:27:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:27:18 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:18 executing program 7: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:18 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x400300, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2325.291764] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:27:41 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:27:41 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:41 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:27:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:27:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0x7ffffffff000) 09:27:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xf0ffff, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:27:41 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) r1 = getpid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e0021a6fe96fe3888739a3907"], 0x20}}, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x4}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, r1, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:27:41 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:27:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:27:41 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:27:41 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0x7ffffffff000) 09:27:41 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:27:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x2000000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2348.188664] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:28:03 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:03 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:28:03 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:03 executing program 7: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0xff}, {0x5}]}, 0x14, 0x2) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) read(r1, &(0x7f0000000300)=""/4, 0x4) splice(r1, &(0x7f00000000c0)=0x6, 0xffffffffffffffff, &(0x7f0000000100)=0x3f, 0x800, 0x0) r2 = getpid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgid(0x0) r4 = epoll_create(0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r4, &(0x7f0000000040)={r4, r5}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x20, 0x20, 0x7f, 0x81, 0x0, 0x9, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xf}, 0x2000, 0x8001, 0x81, 0x6, 0x2, 0x426, 0xb91, 0x0, 0x10000, 0x0, 0xd18c}, r2, 0xf, 0xffffffffffffffff, 0xb) write$binfmt_elf64(r0, 0x0, 0xfdef) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x1ff) 09:28:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:28:03 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:28:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x9000000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:28:03 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:28:03 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:03 executing program 7: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240), 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:03 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2370.182827] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:28:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 1) 09:28:25 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c00000800"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:25 executing program 5: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x7}, 0x4) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) read(r3, &(0x7f0000000300)=""/4, 0x4) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0xd9, 0xff, 0x7f, 0x30, 0x8000000000000000, 0x2, 0x3e, 0x7, 0x2c3, 0x40, 0x31e, 0x23a8c6c4, 0x352, 0x38, 0x2, 0x9, 0x3, 0x1f}, [{0x3, 0x4, 0x93, 0x43, 0x246, 0x6, 0x100000001, 0x5}], "5d078a5fc6ebfec9f67e6a374c03a55a7bc860773462b3545ac2c6b1f025f11d5f604b6fb45d3a0a6dbb4d99a7cdf66ab60b56b93ff01bdac2da0adba6ab4411dc3f247d663a98c6b9319ac76a18be4f44b1b5b2c8b05cdd7c204c804b408753e38f27e03496f8d263b9a4d2a2ac07683cb6ac980281c480b13b2ff1caa2a38b2dd45ca2edb4fe3418375b165f394712d24013e685c2ee79db65a42ca802ea93a301b3cbe265a25598bfafb122e8b36ded7d76a2840d5da31505b483580341a066addd84c9b948d38d189a71f87a59c6757f92c49e6c552eb108de5363daaded1652564e6a1b2cf04a231614ed2b2974d6eda3ef6947910181da08100231df239c182fd6bb94034da5490746587c7b0ba1ac3959435cfc513abf992f1f7fa169573e01f394700028d09b26293fed7ccf266fd7188d9bb89b13ad4db540ea1315fc2e5ab5767c6f5eddf744fe6c2312c2194dd46323c0a9168035f111959a90c4019522c188ddea9cc78512b661af31ac575441aceac0da78abd7218e5ec2240d4fd03c0d546de1571d92b04fccbbb7caa19543b813345d19dfa5a3070ebb69bd82e472b18a11bb1c6fddd02b77627375a6f24d1d7c3e7e55b171fe29c3b7c8f84c762155cd533b5f533deec876e8dca65f53b319653b2c925ca94ec3595812916a31da23de8e88ae972a9575f75d9e462ac339f78ba951fc3ad689df5ed47a93392c30f22b90cdafd7c3433e87a6c7ad2d610478c1f438c4524017be72eaf48bd26c563e51484a83930ffd3372eca90e5d0aea192e75b7a1474d44caad1e1377354ca00ff1db84b42271cda711f208ff5c40af1fc4cb455bfcf2ee2b28a0e86fc9a3ac9a4e228aa094eb6d3e153af40b8c620d56233b31455e8d3603db52cc900ca2c4f60a25cb4833f871c85b552cdb19a68a7bfd7048a431276d57fa10cc930ac513aaf3acfa174a796d0e20cd0bae6f37963a62e7ee373dbc5e1b6cfeb65705ced282b37411e10e5544a1d6cb2005aff90e24d792d4ed9b822fb96b1a740a7bbcf5a0ce637045c9b7c0adfda16ae4d27d1860e5cd0764143b573d78e2f04148de8f1b5d2dfee9bbe987abc811416810b0ceb4008833e2b48c479c42c8472d5a0be5cd3109c8c5ddecb10f38cbb16a0a6531f5aba676fb8c7162610e1fd9bf61b35955345a6602c45d6232f5d793ea65d93b0a5683dd068f2a82d0d9f116a5178c166ab4c818eaa5033946a7a4ab891b02fdeff74b74c4602d1a8dbdb6a34b498d56a1c6246402e085b676f05821f300e4bb5191c2c0def681aeb1b36f6a2909745b01f76ccf259b7626da7b0dd3e6e0de28376a9dc27b4c3c8b02a8b0910c4391f81f184d83b6bd4f72bfcb9dab0dab477abd428eedbcb92fe4a263fbd86fd5eb066392b9e9f1804bd2fb7422e415a0be7409d52b7d4fea6dbfce69665fecc9452fa371a0e97741e466cea0ec58973396fb0b5adb82b05bba134b63900a8ede32069c083ce78620a254bd841e6ea7810d244b095e9c246e2cb00a684b5d1b9ce588108334550d2621e65abeac6604839aabe4fe8656a0d94d3dc006706acc1695cb669a2432b4cad2680977a09e44071c04d85fec8d6b2bbdc2ab319c2f7ef672414f3741ce07d45d618c7966c5015634a784177ec5ab4f254f649404cf573fa1f3ac2d1677e350c328bfa4bc6ec769b8931fcc3dc8cb1889a24e7b637c9c8a8c78775af53d5666ba7aa13d9cbc1e6f51e81c5a4a92e243f3524e11982eb7af703d85e30dd620b52bf840f78fd6f215606703d3da5d1a18eea3cd0c41b6eedbb36867b6d042c8c9577bdf9b7414ce245f80918a60d827339f00d3cd56445d650618af806bbd91059f5cea168395b987ed57dd2edc2983094f5cc0d7f929ea6377aef3ae79a366dc2fd9adacd2303099b4456edd8a9869497d5e5f3cafeeafe212b60812fd6f128a61f805d247d97b7de54acbefce07e641116faad1becef94fedea36e227b16a57dccdfb77e3063ae42867edf5ae3d5a7836be70ac532626b4af89dcde7d818908b157453b27ee34307aab492f0a1c060dd29401b1bb618653802347e8e5276dcf51d049f327ed989e887c70c2ceb99e8481473757e1e806abc5f2af40be4c7367fa6a43a6338b2e9c6ac2cf47a4ebcca263ddabaf62b9e06771615f70a200f8913ec91edadf2896cc04ebd304784b8f04555a248f2d8158601c7e99df0e169576a55fcb707863f0a4e0c45b3d6d2876c1e942bfe6eef36ba48d50e99718ceaacfdb4bd1e2bb0fc9a8d880841f2bc88dd39bfe42140bbff975c857b70ec701da4db04bff4c95462245de1e11e395adcbcd9eac5c96dcd6b8ad83825207d755278996cef4c9406650077438f3947e4b209608e73546d4ffa3206c38ea214bbc637c5f907d1d1257a9c15f948862351e5ad645725eb6a6f405cafbe1466e61bfe6d976db0ba250ff69a2585882347550522a91fd02e622a5e40ae0d7b4b191d68efbe60ec19e1de23f3a534a0a2d056a9c99b75fff48768acbd08f17efe5bf873c90ca2382671e292299fa912d9c386d1882338d4481577bb223457b45c842cfb24a7ff698c14b4bf0a94838d9e372f05a89c9f471649f301360e265a768148edea2b92a3a4fbce109cb0c9124c4f432e69872a8571298aaea7d113f375462f492e44f7a9ab728dae459f55ae217e7ee357a4e83185590f3ac295d8d9f7ca026b36b2a88c2e02b965da50461b02f315a5f77e556a6edf22ac9c7b667e76c37e4285070b593087705995765da1575bab405e0dbbfcd2c0bc23abc7768a685d248a8bbcf4b45a68f2171eb14c7d014754701f84821acc971494e568c8e3aaae5dfa82ff78c75e5ed5d890c72cdcd62efeb4fc4ba57ba14c44397eec42f2887af8e724ef1fc9b2736abbb457bd946fa02c5940e24ccd43dc9a47da2bd427913c4a63d6a537d806b6fef1a3aa0b63d1482e0543492b74e79a952f7b69cf8799830e55854f40d9ba5efcdcc7e22b2ad4c54e030417f64d99c089d487a2d6b01c6c4edc425619083363a2f77ef68e544afa0f2f8e73f730ac738813a00d88e39f02d7d65dbd919f491b880988dedb8ca0ca517e79dade96eb1d3973beaf6eef8c8fddb293ac2b63861fcbcd2a1483a871235c5b8c34eb3ca9fc7707a61af1ce9dd769402b52cda0b63732e0718da884b3c339d1646672ce1217c47cff46d67cfa7699dd197c63ceaec2fc151c28f7f23b8f60676b0172dd349e4907df6455cef181f5268af553774cd6c6e04f6834d925ea50965b8c14fb2411b3c75b727c247a7b9e99e0bea2f6f243c3346d5fb3f76ee6316d1ce685563a31053fafb125467cfea10dc3b4253556b5ce88c4a00a6267e02cd7f0fb4f3551130ba9e5b9511986cd39071fb6501ccf7c62b36430b5b073a34dd70f7b3a512dab2ed53bc6aadae867f533c78ddd7345613292b8339b272abe187072fcf4a7d93c1cce07af29521de9b84b9a0c7e7382b92dc63477b1ab2edfbe4739be319c9d10ce739e4e17f8fe906c7aa073ee86af279abca6fbc9134d1cbac0e5039452f9c561f5765a57a05ec62e60840cf2a0c0db7d9edd4561e960101c814b7ed6c29dd17f988072a76ec5b9d1e56e766aa354a4e7de8e3d15ad1a9cd2533436e23647f8fa62a7c5e2ad364a64dc5350306f642628d278a7ef7d6bcefbae1e72c96f9e06e8a8ad36435e95cce0c46c85bdd3a51009a606cc8dfb757ba3ad59792fc6719aef3d7517a292ed50d751c700c4f1a8cbceb001a35db0b9a32689f95c8393e969b43cef386846ecbe07147c374331182c9cd28f372a8c23067d487ce2f2b50dea80adfc77bb24aa39139dcfb3c6af06d608d4a022da0e176bfccc53905a08441c9db5790b27de176dabf0ad52c6750040083d6a1ca252f30dcffaee97b48afa374b4aca3fdf681614e3187e76a2dd6e81ceeac451e7087ab034a83b6293edbe0a4f2c4e4c24ee794dd2b03d66d25ce2699ea9bd142b189212155e1a49b314afcbbc9df97ffba37483dd0db5f1d7a86d7ad96be0504aa660601bc942c61e5277289328295f14e9f405ac151a823178329a2bf4d195288eedf6344bd5df52e271fe17d90a5c9b7f8d6a923e92bce06cad387b2ea5a9e0c87d3de732eddbfbf9036c832a227dc7c83c584d07389c5385e7bcae218c933fd72d2e2b140af18d8d722d6c4c83a47da77ac41440fc9228496adc73555e06ea1314d70104990ef927c2028ffe9df14c50cb40730c82a3bd2984a6d001f62ebb9b815534bb7bd7a3f4103f15340404f78acae8318778bc0b09ec3cc9f38e65570a262e955605732e8c097b4fc699fda3f4e222fbdeb4a9e626a6ebc083940ff743ce27851c6e7ef37f6db0dd2ce7c50d29b90e8cb5d1f8d0623c3a885389c28348c03f44b2014a54d16ddf605fc637f0a97c9ed0afd64576ef2df4c7706d8b3884fa1096e783f154df59b232bc777903ee38bfeba2c24082a78769dc96061009b61c5fcdd66584e3386597ab22f498472702e21a3a832e3b601f3c4f0bd211fb339738065b79f20bf19cc0554b57cfe1d5941de287a9b8d5229d7bc3631901afe3132e716dba1c6899e45a19e86d0099c763ec28c8055e00a1e390b28191ebb205f3e1da6c690647a69338d3bf3a5e7598598879b0e2bf18bc10bd01a46b3e911a914820be7a6b7118f46ceac67b3989f13339cc6519dc122552125ffff963fbcb60eeff5f7f1eb22a4334a1498ecbde0eb16a28226f34e403bf75ee37499a28002778f96b4d9683da9987855283692aa95da347c338b417b3533cba34a1ad306b69b1370c127a3324e97d2105bc9279a1c2ccc0d44e664e4738e85befc0a29196004e1df5fc7555227333f7d60601c38e39e95d73c83d3d50a34f038b733f4eb7872ebb6d00a170b288b254685ae6fbef49334d20ddbb7a4e8bb8c536e0805edfdbd859c8670c9b4720a544ddcfb4812d5db55d142aaa8905d25f88cf925dc917055b1f06a40157040e76bad50f59b3fe5e30f90308cc9c2f53316a60427a25a2c674ac74b2604c8ae97cf98548e8e60beeb5892d5092b4ebe567b238cd655caec8344e557402f3e427e200fdf145b4c71bd3eb72032c3836d1133697783a675f63f615a40a0328f432d4a9f24c3114e2e86900722748a06007537b03b7ea7340d7f3095d365730213ea303542245a2229e558ffbb5f890da10b9f0c505a3e637d957d93f5331d5bbf8061543a4ddcc4a948d03fffeccd7916d0b978198994a93bd8eab6ebe2d1eab30039ec9c373e8bb4657de81a277809ea74022c1f3937bf60fd01ad112328ac3f0ce653cafe47e878fb77b2c08f9b422a0fd4b4afdc96a9d8d1b8bc2a90dd2fead7d827d57e984dbf91f95a224df6166304d829ce6fa8d5b26649c730504be28ffb87cb230345fc9b0b90c563d8792d9f6ace01296f8cbf93a50233349b93c99360f502f39672cc09af10c53b374a4e774da6392e9a34bb8a8e64054884ac2cb7fb4c270f5edd2b0e7eda7086312cf49b134891520dd4bb63b19177aeda85194dce219f63d41dba68a94581329588c92339e930cb82e1103018db4ff0a7822e41eb1f37f80e3b297a2018a486447359521d64d6edddcddf3c39df8418672976118e25e2afab342a8370541d422d5e061d7fa48406703df426c7d63e0fbd5ac7a0bd855ef546d354ec2c0b469376079c3bc4cae25df317a7ed59dbd67916e1c3766a8c3515cb157a486ea8f540fe66e764db10905bc96910c0ab47c96539581fa2894b5ed7", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1578) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:28:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:28:25 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:25 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:25 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 1) 09:28:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xf000000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2378.126998] FAULT_INJECTION: forcing a failure. [ 2378.126998] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.128802] CPU: 1 PID: 16306 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2378.129803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.130998] Call Trace: [ 2378.131401] dump_stack+0x107/0x167 [ 2378.131927] should_fail.cold+0x5/0xa [ 2378.132474] ? mb_cache_entry_create+0xbf/0x890 [ 2378.133136] should_failslab+0x5/0x20 [ 2378.133651] kmem_cache_alloc+0x5b/0x360 [ 2378.134243] mb_cache_entry_create+0xbf/0x890 [ 2378.134916] ext4_xattr_get+0x563/0xa00 [ 2378.135530] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2378.136185] ? xattr_resolve_name+0x26e/0x3e0 [ 2378.136826] ? ext4_xattr_security_set+0x40/0x40 [ 2378.137491] __vfs_getxattr+0xe3/0x150 [ 2378.138019] ? __vfs_setxattr+0x180/0x180 [ 2378.138604] ? lock_acquire+0x197/0x490 [ 2378.139172] ? ext4_file_write_iter+0x377/0x18e0 [ 2378.139880] cap_inode_need_killpriv+0x3c/0x60 [ 2378.140509] security_inode_need_killpriv+0x46/0xa0 [ 2378.141233] file_remove_privs+0x30f/0x540 [ 2378.141812] ? init_once+0x230/0x230 [ 2378.142330] ? generic_write_checks+0x2ad/0x390 [ 2378.143020] ? generic_write_check_limits+0x2a0/0x2a0 [ 2378.143733] ? down_write+0xe0/0x160 [ 2378.144141] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2378.144701] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2378.145282] file_modified+0x14/0xa0 [ 2378.145699] ext4_file_write_iter+0x906/0x18e0 [ 2378.146221] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2378.146725] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2378.147322] ? SOFTIRQ_verbose+0x10/0x10 [ 2378.147766] new_sync_write+0x42c/0x660 [ 2378.148215] ? new_sync_read+0x6f0/0x6f0 [ 2378.148676] ? ksys_write+0x12d/0x260 [ 2378.149104] ? lock_release+0x6b0/0x6b0 [ 2378.149546] ? selinux_file_permission+0x36/0x510 [ 2378.150085] ? __fget_files+0x296/0x480 [ 2378.150534] vfs_write+0x747/0xa30 [ 2378.150937] ksys_write+0x12d/0x260 [ 2378.151468] ? __ia32_sys_read+0xb0/0xb0 [ 2378.152023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.152720] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.153430] do_syscall_64+0x33/0x40 [ 2378.153949] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2378.154633] RIP: 0033:0x7ff051cc9b19 [ 2378.155137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.157712] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2378.158755] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2378.159746] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2378.160755] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.161719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2378.162800] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 [ 2378.198203] FAULT_INJECTION: forcing a failure. [ 2378.198203] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.199830] CPU: 1 PID: 16317 Comm: syz-executor.7 Not tainted 5.10.151 #1 [ 2378.200819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.202139] Call Trace: [ 2378.202570] dump_stack+0x107/0x167 [ 2378.203211] should_fail.cold+0x5/0xa [ 2378.203756] ? mb_cache_entry_create+0xbf/0x890 [ 2378.204409] should_failslab+0x5/0x20 [ 2378.204911] kmem_cache_alloc+0x5b/0x360 [ 2378.205480] mb_cache_entry_create+0xbf/0x890 [ 2378.206131] ext4_xattr_get+0x563/0xa00 [ 2378.206820] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2378.207515] ? xattr_resolve_name+0x26e/0x3e0 [ 2378.208232] ? ext4_xattr_security_set+0x40/0x40 [ 2378.208899] __vfs_getxattr+0xe3/0x150 [ 2378.209517] ? __vfs_setxattr+0x180/0x180 [ 2378.210198] ? lock_acquire+0x197/0x490 [ 2378.210770] ? ext4_file_write_iter+0x377/0x18e0 [ 2378.211463] cap_inode_need_killpriv+0x3c/0x60 [ 2378.212139] security_inode_need_killpriv+0x46/0xa0 [ 2378.212895] file_remove_privs+0x30f/0x540 [ 2378.213470] ? init_once+0x230/0x230 [ 2378.213993] ? generic_write_checks+0x2ad/0x390 [ 2378.214716] ? generic_write_check_limits+0x2a0/0x2a0 [ 2378.215537] ? down_write+0xe0/0x160 [ 2378.216054] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2378.216762] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2378.217493] file_modified+0x14/0xa0 [ 2378.218072] ext4_file_write_iter+0x906/0x18e0 [ 2378.218925] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2378.219635] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2378.220528] ? SOFTIRQ_verbose+0x10/0x10 [ 2378.221182] new_sync_write+0x42c/0x660 [ 2378.221741] ? new_sync_read+0x6f0/0x6f0 [ 2378.222292] ? ksys_write+0x12d/0x260 [ 2378.222893] ? lock_release+0x6b0/0x6b0 [ 2378.223492] ? selinux_file_permission+0x36/0x510 [ 2378.224191] ? __fget_files+0x296/0x480 [ 2378.224745] vfs_write+0x747/0xa30 [ 2378.225256] ksys_write+0x12d/0x260 [ 2378.225779] ? __ia32_sys_read+0xb0/0xb0 [ 2378.226352] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.227091] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.227829] do_syscall_64+0x33/0x40 [ 2378.228379] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2378.229093] RIP: 0033:0x7fc9e9277b19 [ 2378.229608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.232037] RSP: 002b:00007fc9e67ed188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2378.233104] RAX: ffffffffffffffda RBX: 00007fc9e938af60 RCX: 00007fc9e9277b19 [ 2378.234072] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2378.235029] RBP: 00007fc9e67ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.236035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2378.237007] R13: 00007ffc038aee0f R14: 00007fc9e67ed300 R15: 0000000000022000 09:28:25 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x12010000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:28:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 2) 09:28:25 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:25 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 2) 09:28:25 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:28:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2378.577256] FAULT_INJECTION: forcing a failure. [ 2378.577256] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.579380] CPU: 0 PID: 16434 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2378.580298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.581394] Call Trace: [ 2378.581749] dump_stack+0x107/0x167 [ 2378.582218] should_fail.cold+0x5/0xa [ 2378.582709] ? create_object.isra.0+0x3a/0xa20 [ 2378.583342] should_failslab+0x5/0x20 [ 2378.583868] kmem_cache_alloc+0x5b/0x360 [ 2378.584433] create_object.isra.0+0x3a/0xa20 [ 2378.585051] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2378.585733] kmem_cache_alloc+0x159/0x360 [ 2378.586276] mb_cache_entry_create+0xbf/0x890 [ 2378.586895] ext4_xattr_get+0x563/0xa00 [ 2378.587454] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2378.588069] ? xattr_resolve_name+0x26e/0x3e0 [ 2378.588664] ? ext4_xattr_security_set+0x40/0x40 [ 2378.589283] __vfs_getxattr+0xe3/0x150 [ 2378.589798] ? __vfs_setxattr+0x180/0x180 [ 2378.590351] ? lock_acquire+0x197/0x490 [ 2378.590879] ? ext4_file_write_iter+0x377/0x18e0 [ 2378.591552] cap_inode_need_killpriv+0x3c/0x60 [ 2378.592151] security_inode_need_killpriv+0x46/0xa0 [ 2378.592825] file_remove_privs+0x30f/0x540 [ 2378.593387] ? init_once+0x230/0x230 [ 2378.593886] ? generic_write_checks+0x2ad/0x390 [ 2378.594499] ? generic_write_check_limits+0x2a0/0x2a0 [ 2378.595206] ? down_write+0xe0/0x160 [ 2378.595696] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2378.596394] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2378.597153] file_modified+0x14/0xa0 [ 2378.597658] ext4_file_write_iter+0x906/0x18e0 [ 2378.598276] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2378.598894] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2378.599629] ? SOFTIRQ_verbose+0x10/0x10 [ 2378.600185] new_sync_write+0x42c/0x660 [ 2378.600720] ? new_sync_read+0x6f0/0x6f0 [ 2378.601257] ? ksys_write+0x12d/0x260 [ 2378.601766] ? lock_release+0x6b0/0x6b0 [ 2378.602290] ? selinux_file_permission+0x36/0x510 [ 2378.602930] ? __fget_files+0x296/0x480 [ 2378.603500] vfs_write+0x747/0xa30 [ 2378.603978] ksys_write+0x12d/0x260 [ 2378.604444] ? __ia32_sys_read+0xb0/0xb0 [ 2378.604982] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.605656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.606324] do_syscall_64+0x33/0x40 [ 2378.606840] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2378.607532] RIP: 0033:0x7ff051cc9b19 [ 2378.608059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.610504] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2378.611632] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2378.612548] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2378.613452] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.614385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2378.615349] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 [ 2378.626542] FAULT_INJECTION: forcing a failure. [ 2378.626542] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.628278] CPU: 1 PID: 16439 Comm: syz-executor.7 Not tainted 5.10.151 #1 [ 2378.629224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2378.630377] Call Trace: [ 2378.630760] dump_stack+0x107/0x167 [ 2378.631304] should_fail.cold+0x5/0xa [ 2378.631853] ? create_object.isra.0+0x3a/0xa20 [ 2378.632499] should_failslab+0x5/0x20 [ 2378.633034] kmem_cache_alloc+0x5b/0x360 [ 2378.633615] create_object.isra.0+0x3a/0xa20 [ 2378.634238] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2378.634954] kmem_cache_alloc+0x159/0x360 [ 2378.635533] mb_cache_entry_create+0xbf/0x890 [ 2378.636177] ext4_xattr_get+0x563/0xa00 [ 2378.636761] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2378.637417] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2378.638065] ? rwsem_down_write_slowpath+0x510/0xc00 [ 2378.638784] ? xattr_resolve_name+0x26e/0x3e0 [ 2378.639482] ? ext4_xattr_security_set+0x40/0x40 [ 2378.640152] __vfs_getxattr+0xe3/0x150 [ 2378.640690] ? __vfs_setxattr+0x180/0x180 [ 2378.641273] ? lock_acquire+0x197/0x490 [ 2378.641848] cap_inode_need_killpriv+0x3c/0x60 [ 2378.642492] security_inode_need_killpriv+0x46/0xa0 [ 2378.643200] file_remove_privs+0x30f/0x540 [ 2378.643792] ? init_once+0x230/0x230 [ 2378.644312] ? generic_write_checks+0x2ad/0x390 [ 2378.644956] ? generic_write_check_limits+0x2a0/0x2a0 [ 2378.645652] ? down_write+0x140/0x160 [ 2378.646172] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2378.646864] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2378.647633] file_modified+0x14/0xa0 [ 2378.648172] ext4_file_write_iter+0x906/0x18e0 [ 2378.648837] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2378.649491] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2378.650224] ? SOFTIRQ_verbose+0x10/0x10 [ 2378.650816] new_sync_write+0x42c/0x660 [ 2378.651407] ? new_sync_read+0x6f0/0x6f0 [ 2378.651998] ? ksys_write+0x12d/0x260 [ 2378.652519] ? lock_release+0x6b0/0x6b0 [ 2378.653061] ? selinux_file_permission+0x36/0x510 [ 2378.653721] ? __fget_files+0x296/0x480 [ 2378.654275] vfs_write+0x747/0xa30 [ 2378.654753] ksys_write+0x12d/0x260 [ 2378.655275] ? __ia32_sys_read+0xb0/0xb0 [ 2378.655840] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2378.656572] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2378.657281] do_syscall_64+0x33/0x40 [ 2378.657788] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2378.658487] RIP: 0033:0x7fc9e9277b19 [ 2378.658992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.661567] RSP: 002b:00007fc9e67cc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2378.662646] RAX: ffffffffffffffda RBX: 00007fc9e938b020 RCX: 00007fc9e9277b19 [ 2378.663667] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2378.664659] RBP: 00007fc9e67cc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2378.665670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2378.666657] R13: 00007ffc038aee0f R14: 00007fc9e67cc300 R15: 0000000000022000 09:28:25 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2391.785899] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:28:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 3) 09:28:46 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:28:46 executing program 5: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000005e, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x20, 0x4}, 0x3800, 0x0, 0x0, 0x0, 0xfd56}, r2, 0x4000000000000000, r1, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) 09:28:46 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:46 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c00000800"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xa6ffffff, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:28:46 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:46 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 3) [ 2399.795282] FAULT_INJECTION: forcing a failure. [ 2399.795282] name failslab, interval 1, probability 0, space 0, times 0 [ 2399.797090] CPU: 1 PID: 16560 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2399.798053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2399.799238] Call Trace: [ 2399.799632] dump_stack+0x107/0x167 [ 2399.800131] should_fail.cold+0x5/0xa [ 2399.800660] ? mb_cache_entry_create+0xbf/0x890 [ 2399.801293] should_failslab+0x5/0x20 [ 2399.801796] kmem_cache_alloc+0x5b/0x360 [ 2399.802349] mb_cache_entry_create+0xbf/0x890 [ 2399.802975] ext4_xattr_get+0x563/0xa00 [ 2399.803564] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2399.804237] ? xattr_resolve_name+0x26e/0x3e0 [ 2399.804892] ? ext4_xattr_security_set+0x40/0x40 [ 2399.805539] __vfs_getxattr+0xe3/0x150 [ 2399.806083] ? __vfs_setxattr+0x180/0x180 [ 2399.806684] ? igrab+0xc0/0xc0 [ 2399.807136] ? ext4_xattr_security_set+0x40/0x40 [ 2399.807854] cap_inode_need_killpriv+0x3c/0x60 [ 2399.808502] security_inode_need_killpriv+0x46/0xa0 [ 2399.809163] notify_change+0x886/0x1080 [ 2399.809744] file_remove_privs+0x386/0x540 [ 2399.810337] ? init_once+0x230/0x230 [ 2399.810873] ? generic_write_checks+0x2ad/0x390 [ 2399.811585] ? down_write+0xe0/0x160 [ 2399.812133] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2399.812841] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2399.813593] file_modified+0x14/0xa0 [ 2399.814144] ext4_file_write_iter+0x906/0x18e0 [ 2399.814798] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2399.815519] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2399.816275] ? SOFTIRQ_verbose+0x10/0x10 [ 2399.816949] new_sync_write+0x42c/0x660 [ 2399.817506] ? new_sync_read+0x6f0/0x6f0 [ 2399.818075] ? ksys_write+0x12d/0x260 [ 2399.818587] ? lock_release+0x6b0/0x6b0 [ 2399.819177] ? selinux_file_permission+0x36/0x510 [ 2399.819909] ? __fget_files+0x296/0x480 [ 2399.820474] vfs_write+0x747/0xa30 [ 2399.820981] ksys_write+0x12d/0x260 [ 2399.821481] ? __ia32_sys_read+0xb0/0xb0 [ 2399.822114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2399.822881] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2399.823636] do_syscall_64+0x33/0x40 [ 2399.824162] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2399.824926] RIP: 0033:0x7ff051cc9b19 [ 2399.825496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2399.828093] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2399.829169] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2399.830157] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2399.831164] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2399.832223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2399.833217] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:28:46 executing program 5: ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) r1 = pidfd_getfd(r0, r0, 0x0) write$P9_RFLUSH(r1, &(0x7f00000000c0)={0x7, 0x6d, 0x2}, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:28:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xc00e0000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2399.862954] FAULT_INJECTION: forcing a failure. [ 2399.862954] name failslab, interval 1, probability 0, space 0, times 0 [ 2399.864697] CPU: 0 PID: 16572 Comm: syz-executor.7 Not tainted 5.10.151 #1 [ 2399.865642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2399.866804] Call Trace: [ 2399.867193] dump_stack+0x107/0x167 [ 2399.867785] should_fail.cold+0x5/0xa [ 2399.868422] ? mb_cache_entry_create+0xbf/0x890 [ 2399.869040] should_failslab+0x5/0x20 [ 2399.869533] kmem_cache_alloc+0x5b/0x360 [ 2399.870099] mb_cache_entry_create+0xbf/0x890 [ 2399.870730] ext4_xattr_get+0x563/0xa00 [ 2399.871305] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2399.871968] ? xattr_resolve_name+0x26e/0x3e0 [ 2399.872576] ? ext4_xattr_security_set+0x40/0x40 [ 2399.873229] __vfs_getxattr+0xe3/0x150 [ 2399.873775] ? __vfs_setxattr+0x180/0x180 [ 2399.874362] ? igrab+0xc0/0xc0 [ 2399.874807] ? ext4_xattr_security_set+0x40/0x40 [ 2399.875453] cap_inode_need_killpriv+0x3c/0x60 [ 2399.876092] security_inode_need_killpriv+0x46/0xa0 [ 2399.876807] notify_change+0x886/0x1080 [ 2399.877360] file_remove_privs+0x386/0x540 [ 2399.877928] ? init_once+0x230/0x230 [ 2399.878442] ? generic_write_checks+0x2ad/0x390 [ 2399.879111] ? down_write+0xe0/0x160 [ 2399.879676] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2399.880382] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2399.881151] file_modified+0x14/0xa0 [ 2399.881690] ext4_file_write_iter+0x906/0x18e0 [ 2399.882354] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2399.883015] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2399.883778] ? SOFTIRQ_verbose+0x10/0x10 [ 2399.884360] new_sync_write+0x42c/0x660 [ 2399.884928] ? new_sync_read+0x6f0/0x6f0 [ 2399.885531] ? ksys_write+0x12d/0x260 [ 2399.886084] ? lock_release+0x6b0/0x6b0 [ 2399.886639] ? selinux_file_permission+0x36/0x510 [ 2399.887330] ? __fget_files+0x296/0x480 [ 2399.887985] vfs_write+0x747/0xa30 [ 2399.888496] ksys_write+0x12d/0x260 [ 2399.889010] ? __ia32_sys_read+0xb0/0xb0 [ 2399.889588] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2399.890357] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2399.891088] do_syscall_64+0x33/0x40 [ 2399.891629] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2399.892371] RIP: 0033:0x7fc9e9277b19 [ 2399.892908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2399.895560] RSP: 002b:00007fc9e67ed188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2399.896649] RAX: ffffffffffffffda RBX: 00007fc9e938af60 RCX: 00007fc9e9277b19 [ 2399.897689] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2399.898677] RBP: 00007fc9e67ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2399.899743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2399.900725] R13: 00007ffc038aee0f R14: 00007fc9e67ed300 R15: 0000000000022000 09:28:46 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:28:46 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 4) 09:28:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 4) 09:28:47 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:47 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:28:47 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2400.299843] FAULT_INJECTION: forcing a failure. [ 2400.299843] name failslab, interval 1, probability 0, space 0, times 0 [ 2400.303266] CPU: 0 PID: 16694 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2400.304236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2400.305438] Call Trace: [ 2400.305788] dump_stack+0x107/0x167 [ 2400.306286] should_fail.cold+0x5/0xa [ 2400.306816] ? create_object.isra.0+0x3a/0xa20 [ 2400.307468] should_failslab+0x5/0x20 [ 2400.308031] kmem_cache_alloc+0x5b/0x360 [ 2400.308592] create_object.isra.0+0x3a/0xa20 [ 2400.309188] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2400.309890] kmem_cache_alloc+0x159/0x360 [ 2400.310481] mb_cache_entry_create+0xbf/0x890 [ 2400.311102] ext4_xattr_get+0x563/0xa00 [ 2400.311674] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2400.312305] ? xattr_resolve_name+0x26e/0x3e0 [ 2400.312935] ? ext4_xattr_security_set+0x40/0x40 [ 2400.313574] __vfs_getxattr+0xe3/0x150 [ 2400.314099] ? __vfs_setxattr+0x180/0x180 [ 2400.314683] ? igrab+0xc0/0xc0 [ 2400.315127] ? ext4_xattr_security_set+0x40/0x40 [ 2400.315838] cap_inode_need_killpriv+0x3c/0x60 [ 2400.316478] security_inode_need_killpriv+0x46/0xa0 [ 2400.317165] notify_change+0x886/0x1080 [ 2400.317753] file_remove_privs+0x386/0x540 [ 2400.318354] ? init_once+0x230/0x230 [ 2400.318881] ? generic_write_checks+0x2ad/0x390 [ 2400.319588] ? down_write+0xe0/0x160 [ 2400.320114] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2400.320812] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2400.321562] file_modified+0x14/0xa0 [ 2400.322092] ext4_file_write_iter+0x906/0x18e0 [ 2400.322750] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2400.323390] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2400.324141] ? SOFTIRQ_verbose+0x10/0x10 [ 2400.324735] new_sync_write+0x42c/0x660 [ 2400.325303] ? new_sync_read+0x6f0/0x6f0 [ 2400.325857] ? ksys_write+0x12d/0x260 [ 2400.326398] ? lock_release+0x6b0/0x6b0 [ 2400.326950] ? selinux_file_permission+0x36/0x510 [ 2400.327648] ? __fget_files+0x296/0x480 [ 2400.328227] vfs_write+0x747/0xa30 [ 2400.328736] ksys_write+0x12d/0x260 [ 2400.329224] ? __ia32_sys_read+0xb0/0xb0 [ 2400.329793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2400.330515] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2400.331245] do_syscall_64+0x33/0x40 [ 2400.331884] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2400.332583] RIP: 0033:0x7ff051cc9b19 [ 2400.333109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2400.335794] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2400.336879] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2400.337803] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2400.338783] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2400.339804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2400.340853] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 [ 2400.342373] FAULT_INJECTION: forcing a failure. [ 2400.342373] name failslab, interval 1, probability 0, space 0, times 0 [ 2400.344058] CPU: 1 PID: 16697 Comm: syz-executor.7 Not tainted 5.10.151 #1 [ 2400.345002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2400.346095] Call Trace: [ 2400.346452] dump_stack+0x107/0x167 [ 2400.346978] should_fail.cold+0x5/0xa [ 2400.347738] ? create_object.isra.0+0x3a/0xa20 [ 2400.348339] should_failslab+0x5/0x20 [ 2400.348849] kmem_cache_alloc+0x5b/0x360 [ 2400.349592] create_object.isra.0+0x3a/0xa20 [ 2400.350192] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2400.350868] kmem_cache_alloc+0x159/0x360 [ 2400.351418] mb_cache_entry_create+0xbf/0x890 [ 2400.352039] ext4_xattr_get+0x563/0xa00 [ 2400.352561] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2400.353188] ? xattr_resolve_name+0x26e/0x3e0 [ 2400.353786] ? ext4_xattr_security_set+0x40/0x40 [ 2400.354607] __vfs_getxattr+0xe3/0x150 [ 2400.355137] ? __vfs_setxattr+0x180/0x180 [ 2400.355717] ? igrab+0xc0/0xc0 [ 2400.356143] ? ext4_xattr_security_set+0x40/0x40 [ 2400.356816] cap_inode_need_killpriv+0x3c/0x60 [ 2400.357631] security_inode_need_killpriv+0x46/0xa0 [ 2400.358287] notify_change+0x886/0x1080 [ 2400.358884] file_remove_privs+0x386/0x540 [ 2400.359594] ? init_once+0x230/0x230 [ 2400.360152] ? generic_write_checks+0x2ad/0x390 [ 2400.360865] ? down_write+0xe0/0x160 [ 2400.361355] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2400.362045] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2400.362740] file_modified+0x14/0xa0 [ 2400.363241] ext4_file_write_iter+0x906/0x18e0 [ 2400.363905] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2400.364515] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2400.365214] ? SOFTIRQ_verbose+0x10/0x10 [ 2400.365781] new_sync_write+0x42c/0x660 [ 2400.366337] ? new_sync_read+0x6f0/0x6f0 [ 2400.366895] ? ksys_write+0x12d/0x260 [ 2400.367423] ? lock_release+0x6b0/0x6b0 [ 2400.368030] ? selinux_file_permission+0x36/0x510 [ 2400.368699] ? __fget_files+0x296/0x480 [ 2400.369261] vfs_write+0x747/0xa30 [ 2400.369767] ksys_write+0x12d/0x260 [ 2400.370277] ? __ia32_sys_read+0xb0/0xb0 [ 2400.370842] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2400.371587] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2400.372319] do_syscall_64+0x33/0x40 [ 2400.372832] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2400.373495] RIP: 0033:0x7fc9e9277b19 [ 2400.373964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2400.376494] RSP: 002b:00007fc9e67cc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2400.377522] RAX: ffffffffffffffda RBX: 00007fc9e938b020 RCX: 00007fc9e9277b19 [ 2400.378487] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2400.379460] RBP: 00007fc9e67cc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2400.380472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2400.381478] R13: 00007ffc038aee0f R14: 00007fc9e67cc300 R15: 0000000000022000 [ 2413.629806] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:29:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:29:08 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 5) 09:29:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:29:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) r1 = fork() perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x20, 0x1f, 0x2, 0x2c, 0x0, 0x9, 0x70004, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x4f67, 0x7}, 0x60, 0x8, 0xd4, 0x5, 0x0, 0x9, 0xffc0, 0x0, 0xfffffffb, 0x0, 0x582}, r1, 0x6, r0, 0x1) 09:29:08 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:08 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 5) 09:29:08 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2421.743177] FAULT_INJECTION: forcing a failure. [ 2421.743177] name failslab, interval 1, probability 0, space 0, times 0 [ 2421.744990] CPU: 1 PID: 16714 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2421.746090] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2421.747436] Call Trace: [ 2421.747828] dump_stack+0x107/0x167 [ 2421.748379] should_fail.cold+0x5/0xa [ 2421.748904] ? jbd2__journal_start+0x190/0x890 [ 2421.749517] should_failslab+0x5/0x20 [ 2421.750041] kmem_cache_alloc+0x5b/0x360 [ 2421.750571] ? _down_write_nest_lock+0x160/0x160 [ 2421.751239] jbd2__journal_start+0x190/0x890 [ 2421.751869] __ext4_journal_start_sb+0x214/0x430 [ 2421.752530] ext4_xattr_set+0x23a/0x340 [ 2421.753104] ? ext4_xattr_set_credits+0x200/0x200 [ 2421.753745] ? _down_write_nest_lock+0x160/0x160 [ 2421.754457] ? xattr_resolve_name+0x26e/0x3e0 [ 2421.755078] ? ext4_initxattrs+0x120/0x120 [ 2421.755648] __vfs_removexattr+0xf9/0x170 [ 2421.756256] ? __vfs_getxattr+0x150/0x150 [ 2421.756845] cap_inode_killpriv+0x19/0x50 [ 2421.757419] security_inode_killpriv+0x46/0xa0 [ 2421.758044] setattr_prepare+0x19f/0x7e0 [ 2421.758588] ext4_setattr+0x1a8/0x22c0 [ 2421.759119] ? igrab+0xc0/0xc0 [ 2421.759554] ? ext4_xattr_security_set+0x40/0x40 [ 2421.760201] ? ext4_journalled_write_end+0x1240/0x1240 [ 2421.760879] notify_change+0xba2/0x1080 [ 2421.761416] file_remove_privs+0x386/0x540 [ 2421.762035] ? init_once+0x230/0x230 [ 2421.762547] ? generic_write_checks+0x2ad/0x390 [ 2421.763192] ? down_write+0xe0/0x160 [ 2421.763697] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2421.764398] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2421.765109] file_modified+0x14/0xa0 [ 2421.765607] ext4_file_write_iter+0x906/0x18e0 [ 2421.766279] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2421.766892] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2421.767590] ? SOFTIRQ_verbose+0x10/0x10 [ 2421.768188] new_sync_write+0x42c/0x660 [ 2421.768725] ? new_sync_read+0x6f0/0x6f0 [ 2421.769277] ? ksys_write+0x12d/0x260 [ 2421.769794] ? lock_release+0x6b0/0x6b0 [ 2421.770351] ? selinux_file_permission+0x36/0x510 [ 2421.771016] ? __fget_files+0x296/0x480 [ 2421.771547] vfs_write+0x747/0xa30 [ 2421.772070] ksys_write+0x12d/0x260 [ 2421.772575] ? __ia32_sys_read+0xb0/0xb0 [ 2421.773121] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2421.773823] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2421.774548] do_syscall_64+0x33/0x40 [ 2421.775051] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2421.775751] RIP: 0033:0x7ff051cc9b19 [ 2421.776293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2421.778783] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2421.779856] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2421.780861] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2421.781837] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2421.782841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2421.783830] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:29:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xff000000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2421.839305] FAULT_INJECTION: forcing a failure. [ 2421.839305] name failslab, interval 1, probability 0, space 0, times 0 [ 2421.840841] CPU: 0 PID: 16720 Comm: syz-executor.7 Not tainted 5.10.151 #1 [ 2421.841765] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2421.842920] Call Trace: [ 2421.843321] dump_stack+0x107/0x167 [ 2421.843843] should_fail.cold+0x5/0xa [ 2421.844350] ? jbd2__journal_start+0x190/0x890 [ 2421.844966] should_failslab+0x5/0x20 [ 2421.845465] kmem_cache_alloc+0x5b/0x360 [ 2421.845993] ? _down_write_nest_lock+0x160/0x160 [ 2421.846674] jbd2__journal_start+0x190/0x890 [ 2421.847287] __ext4_journal_start_sb+0x214/0x430 [ 2421.847966] ext4_xattr_set+0x23a/0x340 [ 2421.848561] ? ext4_xattr_set_credits+0x200/0x200 [ 2421.849205] ? _down_write_nest_lock+0x160/0x160 [ 2421.849831] ? xattr_resolve_name+0x26e/0x3e0 [ 2421.850435] ? ext4_initxattrs+0x120/0x120 [ 2421.851000] __vfs_removexattr+0xf9/0x170 [ 2421.851605] ? __vfs_getxattr+0x150/0x150 [ 2421.852208] cap_inode_killpriv+0x19/0x50 [ 2421.852752] security_inode_killpriv+0x46/0xa0 [ 2421.853373] setattr_prepare+0x19f/0x7e0 [ 2421.853913] ext4_setattr+0x1a8/0x22c0 [ 2421.854452] ? igrab+0xc0/0xc0 [ 2421.854871] ? ext4_xattr_security_set+0x40/0x40 [ 2421.855523] ? ext4_journalled_write_end+0x1240/0x1240 [ 2421.856244] notify_change+0xba2/0x1080 [ 2421.856763] file_remove_privs+0x386/0x540 [ 2421.857385] ? init_once+0x230/0x230 [ 2421.857879] ? generic_write_checks+0x2ad/0x390 [ 2421.858572] ? down_write+0xe0/0x160 [ 2421.859080] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2421.859806] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2421.860540] file_modified+0x14/0xa0 [ 2421.861131] ext4_file_write_iter+0x906/0x18e0 [ 2421.861869] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2421.862489] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2421.863183] ? SOFTIRQ_verbose+0x10/0x10 [ 2421.863746] new_sync_write+0x42c/0x660 [ 2421.864351] ? new_sync_read+0x6f0/0x6f0 [ 2421.864913] ? ksys_write+0x12d/0x260 [ 2421.865450] ? lock_release+0x6b0/0x6b0 [ 2421.866073] ? selinux_file_permission+0x36/0x510 [ 2421.866769] ? __fget_files+0x296/0x480 [ 2421.867341] vfs_write+0x747/0xa30 [ 2421.867886] ksys_write+0x12d/0x260 [ 2421.868371] ? __ia32_sys_read+0xb0/0xb0 [ 2421.868921] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2421.869718] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2421.870538] do_syscall_64+0x33/0x40 [ 2421.871063] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2421.871736] RIP: 0033:0x7fc9e9277b19 [ 2421.872281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2421.874746] RSP: 002b:00007fc9e67ed188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2421.875858] RAX: ffffffffffffffda RBX: 00007fc9e938af60 RCX: 00007fc9e9277b19 [ 2421.876815] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2421.877795] RBP: 00007fc9e67ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2421.878764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2421.879862] R13: 00007ffc038aee0f R14: 00007fc9e67ed300 R15: 0000000000022000 09:29:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 6) 09:29:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:29:08 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 6) 09:29:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r2, 0x0, r2) read(r2, &(0x7f0000000300)=""/4, 0x4) dup2(r1, r2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:29:08 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:08 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:08 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2422.142996] FAULT_INJECTION: forcing a failure. [ 2422.142996] name failslab, interval 1, probability 0, space 0, times 0 [ 2422.144784] CPU: 1 PID: 16736 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2422.145745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2422.146977] Call Trace: [ 2422.147361] dump_stack+0x107/0x167 [ 2422.147884] should_fail.cold+0x5/0xa [ 2422.148405] ? create_object.isra.0+0x3a/0xa20 [ 2422.149112] should_failslab+0x5/0x20 [ 2422.149628] kmem_cache_alloc+0x5b/0x360 [ 2422.150193] create_object.isra.0+0x3a/0xa20 [ 2422.150876] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2422.151596] kmem_cache_alloc+0x159/0x360 [ 2422.152193] ? _down_write_nest_lock+0x160/0x160 [ 2422.152852] jbd2__journal_start+0x190/0x890 [ 2422.153464] __ext4_journal_start_sb+0x214/0x430 [ 2422.154133] ext4_xattr_set+0x23a/0x340 [ 2422.154690] ? ext4_xattr_set_credits+0x200/0x200 [ 2422.155402] ? _down_write_nest_lock+0x160/0x160 [ 2422.156086] ? xattr_resolve_name+0x26e/0x3e0 [ 2422.156713] ? ext4_initxattrs+0x120/0x120 [ 2422.157283] __vfs_removexattr+0xf9/0x170 [ 2422.157831] ? __vfs_getxattr+0x150/0x150 [ 2422.158409] cap_inode_killpriv+0x19/0x50 [ 2422.159046] security_inode_killpriv+0x46/0xa0 [ 2422.159695] setattr_prepare+0x19f/0x7e0 [ 2422.160287] ext4_setattr+0x1a8/0x22c0 [ 2422.160835] ? igrab+0xc0/0xc0 [ 2422.161281] ? ext4_xattr_security_set+0x40/0x40 [ 2422.161931] ? ext4_journalled_write_end+0x1240/0x1240 [ 2422.162605] notify_change+0xba2/0x1080 [ 2422.163126] file_remove_privs+0x386/0x540 [ 2422.163689] ? init_once+0x230/0x230 [ 2422.164230] ? generic_write_checks+0x2ad/0x390 [ 2422.164868] ? down_write+0xe0/0x160 [ 2422.165374] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2422.166091] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2422.166835] file_modified+0x14/0xa0 [ 2422.167357] ext4_file_write_iter+0x906/0x18e0 [ 2422.168006] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2422.168629] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2422.169342] ? SOFTIRQ_verbose+0x10/0x10 [ 2422.169931] new_sync_write+0x42c/0x660 [ 2422.170488] ? new_sync_read+0x6f0/0x6f0 [ 2422.171070] ? ksys_write+0x12d/0x260 [ 2422.171610] ? lock_release+0x6b0/0x6b0 [ 2422.172174] ? selinux_file_permission+0x36/0x510 [ 2422.172843] ? __fget_files+0x296/0x480 [ 2422.173391] vfs_write+0x747/0xa30 [ 2422.173880] ksys_write+0x12d/0x260 [ 2422.174366] ? __ia32_sys_read+0xb0/0xb0 [ 2422.174939] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2422.175659] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2422.176399] do_syscall_64+0x33/0x40 [ 2422.176920] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2422.177637] RIP: 0033:0x7ff051cc9b19 [ 2422.178158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2422.180749] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2422.181825] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2422.182742] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2422.183654] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2422.184593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2422.185540] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:29:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2422.201261] FAULT_INJECTION: forcing a failure. [ 2422.201261] name failslab, interval 1, probability 0, space 0, times 0 [ 2422.203278] CPU: 0 PID: 16741 Comm: syz-executor.7 Not tainted 5.10.151 #1 [ 2422.204250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2422.205396] Call Trace: [ 2422.205825] dump_stack+0x107/0x167 [ 2422.206338] should_fail.cold+0x5/0xa [ 2422.206867] ? create_object.isra.0+0x3a/0xa20 [ 2422.207529] should_failslab+0x5/0x20 [ 2422.208090] kmem_cache_alloc+0x5b/0x360 [ 2422.208655] create_object.isra.0+0x3a/0xa20 [ 2422.209258] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2422.209962] kmem_cache_alloc+0x159/0x360 [ 2422.210530] ? _down_write_nest_lock+0x160/0x160 [ 2422.211198] jbd2__journal_start+0x190/0x890 [ 2422.211884] __ext4_journal_start_sb+0x214/0x430 [ 2422.212537] ext4_xattr_set+0x23a/0x340 [ 2422.213133] ? ext4_xattr_set_credits+0x200/0x200 [ 2422.213816] ? _down_write_nest_lock+0x160/0x160 [ 2422.214477] ? xattr_resolve_name+0x26e/0x3e0 [ 2422.215132] ? ext4_initxattrs+0x120/0x120 [ 2422.215714] __vfs_removexattr+0xf9/0x170 [ 2422.216314] ? __vfs_getxattr+0x150/0x150 [ 2422.216921] cap_inode_killpriv+0x19/0x50 [ 2422.217491] security_inode_killpriv+0x46/0xa0 [ 2422.218111] setattr_prepare+0x19f/0x7e0 [ 2422.218713] ext4_setattr+0x1a8/0x22c0 [ 2422.219263] ? igrab+0xc0/0xc0 [ 2422.219720] ? ext4_xattr_security_set+0x40/0x40 [ 2422.220414] ? ext4_journalled_write_end+0x1240/0x1240 [ 2422.221142] notify_change+0xba2/0x1080 [ 2422.221692] file_remove_privs+0x386/0x540 [ 2422.222263] ? init_once+0x230/0x230 [ 2422.222782] ? generic_write_checks+0x2ad/0x390 [ 2422.223423] ? down_write+0xe0/0x160 [ 2422.223977] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2422.224673] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2422.225409] file_modified+0x14/0xa0 [ 2422.225934] ext4_file_write_iter+0x906/0x18e0 [ 2422.226726] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2422.227356] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2422.228130] ? SOFTIRQ_verbose+0x10/0x10 [ 2422.228694] new_sync_write+0x42c/0x660 [ 2422.229219] ? new_sync_read+0x6f0/0x6f0 [ 2422.229757] ? ksys_write+0x12d/0x260 [ 2422.230270] ? lock_release+0x6b0/0x6b0 [ 2422.230801] ? selinux_file_permission+0x36/0x510 [ 2422.231477] ? __fget_files+0x296/0x480 [ 2422.232068] vfs_write+0x747/0xa30 [ 2422.232565] ksys_write+0x12d/0x260 [ 2422.233060] ? __ia32_sys_read+0xb0/0xb0 [ 2422.233608] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2422.234322] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2422.235040] do_syscall_64+0x33/0x40 [ 2422.235573] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2422.236296] RIP: 0033:0x7fc9e9277b19 [ 2422.236824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2422.239399] RSP: 002b:00007fc9e67ed188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2422.240438] RAX: ffffffffffffffda RBX: 00007fc9e938af60 RCX: 00007fc9e9277b19 [ 2422.241363] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2422.242296] RBP: 00007fc9e67ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2422.243260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2422.244318] R13: 00007ffc038aee0f R14: 00007fc9e67ed300 R15: 0000000000022000 09:29:09 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:29:09 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 7) 09:29:09 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2422.529092] FAULT_INJECTION: forcing a failure. [ 2422.529092] name failslab, interval 1, probability 0, space 0, times 0 [ 2422.530741] CPU: 0 PID: 16759 Comm: syz-executor.7 Not tainted 5.10.151 #1 [ 2422.531750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2422.532991] Call Trace: [ 2422.533409] dump_stack+0x107/0x167 [ 2422.533955] should_fail.cold+0x5/0xa [ 2422.534516] ? create_object.isra.0+0x3a/0xa20 [ 2422.535175] should_failslab+0x5/0x20 [ 2422.535719] kmem_cache_alloc+0x5b/0x360 [ 2422.536338] ? jbd2_journal_forget+0x3f9/0x690 [ 2422.537002] create_object.isra.0+0x3a/0xa20 [ 2422.537625] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2422.538352] kmem_cache_alloc+0x159/0x360 [ 2422.538948] ? jbd2_journal_put_journal_head+0x3f2/0x560 [ 2422.539726] insert_revoke_hash+0x28/0x270 [ 2422.540358] jbd2_journal_revoke+0x2bb/0x570 [ 2422.540994] __ext4_forget+0x218/0x480 [ 2422.541543] ext4_free_blocks+0x2d3/0x20f0 [ 2422.542141] ? lock_downgrade+0x6d0/0x6d0 [ 2422.542722] ? ext4_mb_new_blocks+0x4890/0x4890 [ 2422.543391] ? jbd2_write_access_granted+0x60/0x3a0 [ 2422.544121] ? wake_up_var+0x120/0x120 [ 2422.544692] ? mb_cache_entry_delete+0x479/0x630 [ 2422.545363] ext4_xattr_release_block+0x56a/0x810 [ 2422.546068] ext4_xattr_block_set+0x1dff/0x2f30 [ 2422.546746] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 2422.547408] ? xattr_find_entry+0x2aa/0x3b0 [ 2422.548079] ? ext4_xattr_block_find+0x5c/0x6a0 [ 2422.548732] ext4_xattr_set_handle+0x1037/0x1320 [ 2422.549426] ? ext4_xattr_ibody_inline_set+0x3a0/0x3a0 [ 2422.550155] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 2422.550918] ? __ext4_journal_start_sb+0x214/0x430 [ 2422.551599] ? __ext4_journal_start_sb+0x1db/0x430 [ 2422.552327] ext4_xattr_set+0x13a/0x340 [ 2422.552919] ? ext4_xattr_set_credits+0x200/0x200 [ 2422.553594] ? _down_write_nest_lock+0x160/0x160 [ 2422.554288] ? xattr_resolve_name+0x26e/0x3e0 [ 2422.554947] ? ext4_initxattrs+0x120/0x120 [ 2422.555591] __vfs_removexattr+0xf9/0x170 [ 2422.556228] ? __vfs_getxattr+0x150/0x150 [ 2422.556837] cap_inode_killpriv+0x19/0x50 [ 2422.557439] security_inode_killpriv+0x46/0xa0 [ 2422.558085] setattr_prepare+0x19f/0x7e0 [ 2422.558649] ext4_setattr+0x1a8/0x22c0 [ 2422.559241] ? igrab+0xc0/0xc0 [ 2422.559707] ? ext4_xattr_security_set+0x40/0x40 [ 2422.560419] ? ext4_journalled_write_end+0x1240/0x1240 [ 2422.561174] notify_change+0xba2/0x1080 [ 2422.561813] file_remove_privs+0x386/0x540 [ 2422.562419] ? init_once+0x230/0x230 [ 2422.562957] ? generic_write_checks+0x2ad/0x390 [ 2422.563606] ? down_write+0xe0/0x160 [ 2422.564148] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2422.564909] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2422.565650] file_modified+0x14/0xa0 [ 2422.566187] ext4_file_write_iter+0x906/0x18e0 [ 2422.566834] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2422.567457] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2422.568209] ? SOFTIRQ_verbose+0x10/0x10 [ 2422.568786] new_sync_write+0x42c/0x660 [ 2422.569347] ? new_sync_read+0x6f0/0x6f0 [ 2422.569929] ? ksys_write+0x12d/0x260 [ 2422.570503] ? lock_release+0x6b0/0x6b0 [ 2422.571075] ? selinux_file_permission+0x36/0x510 [ 2422.571815] ? __fget_files+0x296/0x480 [ 2422.572391] vfs_write+0x747/0xa30 [ 2422.572953] ksys_write+0x12d/0x260 [ 2422.573451] ? __ia32_sys_read+0xb0/0xb0 [ 2422.574005] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2422.574763] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2422.575495] do_syscall_64+0x33/0x40 [ 2422.576072] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2422.576795] RIP: 0033:0x7fc9e9277b19 [ 2422.577316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2422.579953] RSP: 002b:00007fc9e67ed188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2422.580968] RAX: ffffffffffffffda RBX: 00007fc9e938af60 RCX: 00007fc9e9277b19 [ 2422.581965] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2422.582940] RBP: 00007fc9e67ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2422.583906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2422.584855] R13: 00007ffc038aee0f R14: 00007fc9e67ed300 R15: 0000000000022000 [ 2436.289430] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:29:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 7) 09:29:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:29:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) r1 = openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x40) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f00000000c0)={0x7, 'lo\x00', {0xfffffff8}, 0xfbe8}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:29:31 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:31 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:31 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:29:31 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 8) 09:29:31 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2444.397760] FAULT_INJECTION: forcing a failure. [ 2444.397760] name failslab, interval 1, probability 0, space 0, times 0 [ 2444.399385] CPU: 1 PID: 16884 Comm: syz-executor.7 Not tainted 5.10.151 #1 [ 2444.400398] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2444.401536] Call Trace: [ 2444.401942] dump_stack+0x107/0x167 [ 2444.402458] should_fail.cold+0x5/0xa [ 2444.403006] ? create_object.isra.0+0x3a/0xa20 [ 2444.403653] should_failslab+0x5/0x20 [ 2444.404203] kmem_cache_alloc+0x5b/0x360 [ 2444.404770] ? jbd2_journal_forget+0x3f9/0x690 [ 2444.405427] create_object.isra.0+0x3a/0xa20 [ 2444.406039] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2444.406769] kmem_cache_alloc+0x159/0x360 [ 2444.407350] ? jbd2_journal_put_journal_head+0x3f2/0x560 [ 2444.408120] insert_revoke_hash+0x28/0x270 [ 2444.408717] jbd2_journal_revoke+0x2bb/0x570 [ 2444.409342] __ext4_forget+0x218/0x480 [ 2444.409893] ext4_free_blocks+0x2d3/0x20f0 [ 2444.410494] ? lock_downgrade+0x6d0/0x6d0 [ 2444.411084] ? ext4_mb_new_blocks+0x4890/0x4890 [ 2444.411744] ? jbd2_write_access_granted+0x60/0x3a0 [ 2444.412470] ? wake_up_var+0x120/0x120 [ 2444.413017] ? mb_cache_entry_delete+0x479/0x630 [ 2444.413689] ext4_xattr_release_block+0x56a/0x810 [ 2444.414377] ext4_xattr_block_set+0x1dff/0x2f30 [ 2444.415044] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 2444.415714] ? xattr_find_entry+0x2aa/0x3b0 [ 2444.416361] ? ext4_xattr_block_find+0x5c/0x6a0 [ 2444.417019] ext4_xattr_set_handle+0x1037/0x1320 [ 2444.417688] ? ext4_xattr_ibody_inline_set+0x3a0/0x3a0 [ 2444.418432] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 2444.419230] ? __ext4_journal_start_sb+0x214/0x430 [ 2444.419924] ? __ext4_journal_start_sb+0x1db/0x430 [ 2444.420646] ext4_xattr_set+0x13a/0x340 [ 2444.421219] ? ext4_xattr_set_credits+0x200/0x200 [ 2444.421913] ? _down_write_nest_lock+0x160/0x160 [ 2444.422584] ? xattr_resolve_name+0x26e/0x3e0 [ 2444.423222] ? ext4_initxattrs+0x120/0x120 [ 2444.423811] __vfs_removexattr+0xf9/0x170 [ 2444.424424] ? __vfs_getxattr+0x150/0x150 [ 2444.425033] cap_inode_killpriv+0x19/0x50 [ 2444.425605] security_inode_killpriv+0x46/0xa0 [ 2444.426241] setattr_prepare+0x19f/0x7e0 [ 2444.426840] ext4_setattr+0x1a8/0x22c0 [ 2444.427400] ? igrab+0xc0/0xc0 [ 2444.427856] ? ext4_xattr_security_set+0x40/0x40 [ 2444.428559] ? ext4_journalled_write_end+0x1240/0x1240 [ 2444.429284] notify_change+0xba2/0x1080 [ 2444.429858] file_remove_privs+0x386/0x540 [ 2444.430455] ? init_once+0x230/0x230 [ 2444.430991] ? generic_write_checks+0x2ad/0x390 [ 2444.431639] ? down_write+0xe0/0x160 [ 2444.432194] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2444.432893] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2444.433634] file_modified+0x14/0xa0 [ 2444.434169] ext4_file_write_iter+0x906/0x18e0 [ 2444.434834] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2444.435496] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2444.436250] ? SOFTIRQ_verbose+0x10/0x10 [ 2444.436860] new_sync_write+0x42c/0x660 [ 2444.437418] ? new_sync_read+0x6f0/0x6f0 [ 2444.438007] ? ksys_write+0x12d/0x260 [ 2444.438578] ? lock_release+0x6b0/0x6b0 [ 2444.439162] ? selinux_file_permission+0x36/0x510 [ 2444.439834] ? __fget_files+0x296/0x480 [ 2444.440415] vfs_write+0x747/0xa30 [ 2444.440927] ksys_write+0x12d/0x260 [ 2444.441432] ? __ia32_sys_read+0xb0/0xb0 [ 2444.441985] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2444.442970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2444.443743] do_syscall_64+0x33/0x40 [ 2444.444294] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2444.444986] RIP: 0033:0x7fc9e9277b19 [ 2444.445505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2444.448062] RSP: 002b:00007fc9e67ed188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2444.449129] RAX: ffffffffffffffda RBX: 00007fc9e938af60 RCX: 00007fc9e9277b19 [ 2444.450114] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 09:29:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2444.451105] RBP: 00007fc9e67ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2444.452308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2444.453295] R13: 00007ffc038aee0f R14: 00007fc9e67ed300 R15: 0000000000022000 [ 2444.464967] FAULT_INJECTION: forcing a failure. [ 2444.464967] name failslab, interval 1, probability 0, space 0, times 0 [ 2444.466683] CPU: 0 PID: 16878 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2444.467676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2444.468823] Call Trace: [ 2444.469198] dump_stack+0x107/0x167 [ 2444.469705] should_fail.cold+0x5/0xa [ 2444.470282] ? create_object.isra.0+0x3a/0xa20 [ 2444.470914] should_failslab+0x5/0x20 [ 2444.471443] kmem_cache_alloc+0x5b/0x360 [ 2444.472011] ? jbd2_journal_forget+0x3f9/0x690 [ 2444.472663] create_object.isra.0+0x3a/0xa20 [ 2444.473266] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2444.473969] kmem_cache_alloc+0x159/0x360 [ 2444.474540] ? jbd2_journal_put_journal_head+0x3f2/0x560 [ 2444.475282] insert_revoke_hash+0x28/0x270 [ 2444.475857] jbd2_journal_revoke+0x2bb/0x570 [ 2444.476489] __ext4_forget+0x218/0x480 [ 2444.477041] ext4_free_blocks+0x2d3/0x20f0 [ 2444.477648] ? lock_downgrade+0x6d0/0x6d0 [ 2444.478231] ? ext4_mb_new_blocks+0x4890/0x4890 [ 2444.478897] ? jbd2_write_access_granted+0x60/0x3a0 [ 2444.479580] ? wake_up_var+0x120/0x120 [ 2444.480131] ? mb_cache_entry_delete+0x479/0x630 [ 2444.480789] ext4_xattr_release_block+0x56a/0x810 [ 2444.481477] ext4_xattr_block_set+0x1dff/0x2f30 [ 2444.482152] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 2444.482802] ? xattr_find_entry+0x2aa/0x3b0 [ 2444.483408] ? ext4_xattr_block_find+0x5c/0x6a0 [ 2444.484067] ext4_xattr_set_handle+0x1037/0x1320 [ 2444.484746] ? ext4_xattr_ibody_inline_set+0x3a0/0x3a0 [ 2444.485456] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 2444.486208] ? __ext4_journal_start_sb+0x214/0x430 [ 2444.486849] ? __ext4_journal_start_sb+0x1db/0x430 [ 2444.487525] ext4_xattr_set+0x13a/0x340 [ 2444.488124] ? ext4_xattr_set_credits+0x200/0x200 [ 2444.488800] ? _down_write_nest_lock+0x160/0x160 [ 2444.489435] ? xattr_resolve_name+0x26e/0x3e0 [ 2444.490054] ? ext4_initxattrs+0x120/0x120 [ 2444.490653] __vfs_removexattr+0xf9/0x170 [ 2444.491211] ? __vfs_getxattr+0x150/0x150 [ 2444.491823] cap_inode_killpriv+0x19/0x50 [ 2444.492434] security_inode_killpriv+0x46/0xa0 [ 2444.493055] setattr_prepare+0x19f/0x7e0 [ 2444.493605] ext4_setattr+0x1a8/0x22c0 [ 2444.494174] ? igrab+0xc0/0xc0 [ 2444.494618] ? ext4_xattr_security_set+0x40/0x40 [ 2444.495284] ? ext4_journalled_write_end+0x1240/0x1240 [ 2444.496020] notify_change+0xba2/0x1080 [ 2444.496573] file_remove_privs+0x386/0x540 [ 2444.497187] ? init_once+0x230/0x230 [ 2444.497715] ? generic_write_checks+0x2ad/0x390 [ 2444.498409] ? down_write+0xe0/0x160 [ 2444.498953] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2444.499654] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2444.500443] file_modified+0x14/0xa0 [ 2444.500973] ext4_file_write_iter+0x906/0x18e0 [ 2444.501706] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2444.502337] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2444.503069] ? SOFTIRQ_verbose+0x10/0x10 [ 2444.503652] new_sync_write+0x42c/0x660 [ 2444.504237] ? new_sync_read+0x6f0/0x6f0 [ 2444.504803] ? ksys_write+0x12d/0x260 [ 2444.505318] ? lock_release+0x6b0/0x6b0 [ 2444.505920] ? selinux_file_permission+0x36/0x510 [ 2444.506616] ? __fget_files+0x296/0x480 [ 2444.507218] vfs_write+0x747/0xa30 [ 2444.507729] ksys_write+0x12d/0x260 [ 2444.508283] ? __ia32_sys_read+0xb0/0xb0 [ 2444.508913] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2444.509662] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2444.510397] do_syscall_64+0x33/0x40 [ 2444.510918] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2444.511646] RIP: 0033:0x7ff051cc9b19 [ 2444.512209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2444.514863] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2444.515987] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2444.517027] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2444.518054] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2444.519044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2444.520102] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:29:31 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:31 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 9) 09:29:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) read(r1, &(0x7f0000000300)=""/4, 0x4) ioctl$FIONCLEX(r1, 0x5450) [ 2444.862755] FAULT_INJECTION: forcing a failure. [ 2444.862755] name failslab, interval 1, probability 0, space 0, times 0 [ 2444.864435] CPU: 0 PID: 17001 Comm: syz-executor.7 Not tainted 5.10.151 #1 [ 2444.865371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2444.866519] Call Trace: [ 2444.866907] dump_stack+0x107/0x167 [ 2444.867395] should_fail.cold+0x5/0xa [ 2444.867919] ? jbd2__journal_start+0x190/0x890 [ 2444.868572] should_failslab+0x5/0x20 [ 2444.869098] kmem_cache_alloc+0x5b/0x360 [ 2444.869655] jbd2__journal_start+0x190/0x890 [ 2444.870295] __ext4_journal_start_sb+0x214/0x430 [ 2444.870932] ext4_dirty_inode+0xbc/0x130 [ 2444.871477] ? ext4_setattr+0x22c0/0x22c0 [ 2444.872071] __mark_inode_dirty+0x492/0xf10 [ 2444.872708] ? ext4_fc_start_update+0xa2/0x2e0 [ 2444.873359] ext4_setattr+0x7db/0x22c0 [ 2444.873898] ? igrab+0xc0/0xc0 [ 2444.874339] ? ext4_xattr_security_set+0x40/0x40 [ 2444.875015] ? ext4_journalled_write_end+0x1240/0x1240 [ 2444.875766] notify_change+0xba2/0x1080 [ 2444.876381] file_remove_privs+0x386/0x540 [ 2444.876972] ? init_once+0x230/0x230 [ 2444.877507] ? generic_write_checks+0x2ad/0x390 [ 2444.878178] ? down_write+0xe0/0x160 [ 2444.878708] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2444.879387] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2444.880164] file_modified+0x14/0xa0 [ 2444.880676] ext4_file_write_iter+0x906/0x18e0 [ 2444.881320] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2444.881970] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2444.882700] ? SOFTIRQ_verbose+0x10/0x10 [ 2444.883273] new_sync_write+0x42c/0x660 [ 2444.883838] ? new_sync_read+0x6f0/0x6f0 [ 2444.884422] ? ksys_write+0x12d/0x260 [ 2444.884968] ? lock_release+0x6b0/0x6b0 [ 2444.885530] ? selinux_file_permission+0x36/0x510 [ 2444.886215] ? __fget_files+0x296/0x480 [ 2444.886789] vfs_write+0x747/0xa30 [ 2444.887297] ksys_write+0x12d/0x260 [ 2444.887818] ? __ia32_sys_read+0xb0/0xb0 [ 2444.888421] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2444.889162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2444.889895] do_syscall_64+0x33/0x40 [ 2444.890406] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2444.891119] RIP: 0033:0x7fc9e9277b19 [ 2444.891637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2444.894187] RSP: 002b:00007fc9e67ed188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2444.895263] RAX: ffffffffffffffda RBX: 00007fc9e938af60 RCX: 00007fc9e9277b19 [ 2444.896307] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 2444.897330] RBP: 00007fc9e67ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2444.898355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2444.899357] R13: 00007ffc038aee0f R14: 00007fc9e67ed300 R15: 0000000000022000 [ 2458.938159] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:29:53 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:29:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 8) 09:29:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xffffffa6, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:29:53 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:53 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) (fail_nth: 10) 09:29:53 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fc00002}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0xc0182101, &(0x7f0000000440)={r3}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000240)={r4}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r4, 0x3, r6, 0x5}) r7 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) openat(r7, &(0x7f0000000000)='./file0\x00', 0x40440, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) [ 2466.908781] FAULT_INJECTION: forcing a failure. [ 2466.908781] name failslab, interval 1, probability 0, space 0, times 0 [ 2466.910381] CPU: 0 PID: 17019 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2466.911352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2466.912485] Call Trace: [ 2466.912880] dump_stack+0x107/0x167 [ 2466.913368] should_fail.cold+0x5/0xa [ 2466.913865] ? create_object.isra.0+0x3a/0xa20 [ 2466.914481] should_failslab+0x5/0x20 [ 2466.914999] kmem_cache_alloc+0x5b/0x360 [ 2466.915561] ? pagecache_get_page+0x243/0xc80 [ 2466.916201] create_object.isra.0+0x3a/0xa20 [ 2466.916785] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2466.917445] kmem_cache_alloc+0x159/0x360 [ 2466.917988] ext4_free_blocks+0x915/0x20f0 [ 2466.918553] ? ext4_mb_new_blocks+0x4890/0x4890 [ 2466.919180] ? mb_cache_entry_delete+0x479/0x630 [ 2466.919799] ext4_xattr_release_block+0x56a/0x810 [ 2466.920470] ext4_xattr_block_set+0x1dff/0x2f30 [ 2466.921094] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 2466.921722] ? xattr_find_entry+0x2aa/0x3b0 [ 2466.922288] ? ext4_xattr_block_find+0x5c/0x6a0 [ 2466.922896] ext4_xattr_set_handle+0x1037/0x1320 [ 2466.923528] ? ext4_xattr_ibody_inline_set+0x3a0/0x3a0 [ 2466.924212] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 2466.924949] ? __ext4_journal_start_sb+0x214/0x430 [ 2466.925584] ? __ext4_journal_start_sb+0x1db/0x430 [ 2466.926223] ext4_xattr_set+0x13a/0x340 [ 2466.926754] ? ext4_xattr_set_credits+0x200/0x200 [ 2466.927379] ? _down_write_nest_lock+0x160/0x160 [ 2466.927998] ? xattr_resolve_name+0x26e/0x3e0 [ 2466.928588] ? ext4_initxattrs+0x120/0x120 [ 2466.929136] __vfs_removexattr+0xf9/0x170 [ 2466.929668] ? __vfs_getxattr+0x150/0x150 [ 2466.930222] cap_inode_killpriv+0x19/0x50 [ 2466.930753] security_inode_killpriv+0x46/0xa0 [ 2466.931355] setattr_prepare+0x19f/0x7e0 [ 2466.931910] ext4_setattr+0x1a8/0x22c0 [ 2466.932485] ? igrab+0xc0/0xc0 [ 2466.932921] ? ext4_xattr_security_set+0x40/0x40 [ 2466.933557] ? ext4_journalled_write_end+0x1240/0x1240 [ 2466.934253] notify_change+0xba2/0x1080 [ 2466.934812] file_remove_privs+0x386/0x540 [ 2466.935390] ? init_once+0x230/0x230 [ 2466.935936] ? generic_write_checks+0x2ad/0x390 [ 2466.936591] ? down_write+0xe0/0x160 [ 2466.937078] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2466.937742] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.938417] file_modified+0x14/0xa0 [ 2466.938895] ext4_file_write_iter+0x906/0x18e0 [ 2466.939506] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2466.940099] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2466.940793] ? SOFTIRQ_verbose+0x10/0x10 [ 2466.941330] new_sync_write+0x42c/0x660 [ 2466.941846] ? new_sync_read+0x6f0/0x6f0 [ 2466.942377] ? ksys_write+0x12d/0x260 [ 2466.942888] ? lock_release+0x6b0/0x6b0 [ 2466.943455] ? selinux_file_permission+0x36/0x510 [ 2466.944166] ? __fget_files+0x296/0x480 [ 2466.944723] vfs_write+0x747/0xa30 [ 2466.945203] ksys_write+0x12d/0x260 [ 2466.945692] ? __ia32_sys_read+0xb0/0xb0 [ 2466.946238] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2466.946985] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2466.947767] do_syscall_64+0x33/0x40 [ 2466.948395] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2466.949150] RIP: 0033:0x7ff051cc9b19 [ 2466.949678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2466.952198] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2466.953389] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2466.954407] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2466.955417] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2466.956352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2466.957373] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:29:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:29:54 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:29:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 9) 09:29:54 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:29:54 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:54 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:54 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:29:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xffffffff, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2467.293749] FAULT_INJECTION: forcing a failure. [ 2467.293749] name failslab, interval 1, probability 0, space 0, times 0 [ 2467.295381] CPU: 1 PID: 17046 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2467.296297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2467.297409] Call Trace: [ 2467.297765] dump_stack+0x107/0x167 [ 2467.298256] should_fail.cold+0x5/0xa [ 2467.298767] ? jbd2__journal_start+0x190/0x890 [ 2467.299388] should_failslab+0x5/0x20 [ 2467.299900] kmem_cache_alloc+0x5b/0x360 [ 2467.300453] jbd2__journal_start+0x190/0x890 [ 2467.301035] __ext4_journal_start_sb+0x214/0x430 [ 2467.301655] ext4_dirty_inode+0xbc/0x130 [ 2467.302204] ? ext4_setattr+0x22c0/0x22c0 [ 2467.302753] __mark_inode_dirty+0x492/0xf10 [ 2467.303315] ? ext4_fc_start_update+0xa2/0x2e0 [ 2467.303923] ext4_setattr+0x7db/0x22c0 [ 2467.304464] ? igrab+0xc0/0xc0 [ 2467.304894] ? ext4_xattr_security_set+0x40/0x40 [ 2467.305534] ? ext4_journalled_write_end+0x1240/0x1240 [ 2467.306245] notify_change+0xba2/0x1080 [ 2467.306865] file_remove_privs+0x386/0x540 [ 2467.307467] ? init_once+0x230/0x230 [ 2467.308012] ? generic_write_checks+0x2ad/0x390 [ 2467.308673] ? down_write+0xe0/0x160 [ 2467.309158] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2467.309830] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2467.310530] file_modified+0x14/0xa0 [ 2467.311038] ext4_file_write_iter+0x906/0x18e0 [ 2467.311671] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2467.312284] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2467.313010] ? SOFTIRQ_verbose+0x10/0x10 [ 2467.313552] new_sync_write+0x42c/0x660 [ 2467.314077] ? new_sync_read+0x6f0/0x6f0 [ 2467.314617] ? ksys_write+0x12d/0x260 [ 2467.315125] ? lock_release+0x6b0/0x6b0 [ 2467.315653] ? selinux_file_permission+0x36/0x510 [ 2467.316298] ? __fget_files+0x296/0x480 [ 2467.316841] vfs_write+0x747/0xa30 [ 2467.317325] ksys_write+0x12d/0x260 [ 2467.317814] ? __ia32_sys_read+0xb0/0xb0 [ 2467.318368] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2467.319071] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2467.319763] do_syscall_64+0x33/0x40 [ 2467.320259] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2467.320945] RIP: 0033:0x7ff051cc9b19 [ 2467.321447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2467.323915] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2467.324976] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2467.325903] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2467.326837] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2467.327775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2467.328728] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:29:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x1, 0x5, 0x2, 0x0, 0x6, 0x7832, 0x82, 0x40, 0x3a9, 0x3f, 0x200, 0x38, 0x2, 0x5, 0x6000, 0x5}, [{0x2, 0xfff, 0x6, 0x8, 0x7, 0xc81, 0xfffffffffffffff7, 0x300000000000}, {0x2, 0xff, 0x7f, 0x800, 0x328, 0xfffffffffffffffc, 0xff, 0x7}], "aca8e3b8dcdd7e22b2c96602bb692a9d56378564ab241af7899fc9b705db745c042add440a00d02835b19c164bd15a158390", ['\x00', '\x00', '\x00', '\x00']}, 0x4e2) rmdir(&(0x7f0000000000)='./file0\x00') write$binfmt_elf64(r0, 0x0, 0xfdef) [ 2480.377784] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:30:15 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0x7ffffffff000) 09:30:15 executing program 5: fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:30:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0b0000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:30:15 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:15 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c0000080001002000000008000200030000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:15 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:30:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 10) 09:30:15 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0f0000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2489.046535] FAULT_INJECTION: forcing a failure. [ 2489.046535] name failslab, interval 1, probability 0, space 0, times 0 [ 2489.048188] CPU: 0 PID: 17179 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2489.049248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2489.050381] Call Trace: [ 2489.050760] dump_stack+0x107/0x167 [ 2489.051259] should_fail.cold+0x5/0xa [ 2489.051933] ? create_object.isra.0+0x3a/0xa20 [ 2489.052613] should_failslab+0x5/0x20 [ 2489.053137] kmem_cache_alloc+0x5b/0x360 [ 2489.053643] create_object.isra.0+0x3a/0xa20 [ 2489.054200] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2489.054865] kmem_cache_alloc+0x159/0x360 [ 2489.055440] jbd2__journal_start+0x190/0x890 [ 2489.056027] __ext4_journal_start_sb+0x214/0x430 [ 2489.056662] ext4_dirty_inode+0xbc/0x130 [ 2489.057240] ? ext4_setattr+0x22c0/0x22c0 [ 2489.057781] __mark_inode_dirty+0x492/0xf10 [ 2489.058338] ? ext4_fc_start_update+0xa2/0x2e0 [ 2489.058935] ext4_setattr+0x7db/0x22c0 [ 2489.059453] ? igrab+0xc0/0xc0 [ 2489.059896] ? ext4_xattr_security_set+0x40/0x40 [ 2489.060529] ? ext4_journalled_write_end+0x1240/0x1240 [ 2489.061242] notify_change+0xba2/0x1080 [ 2489.061794] file_remove_privs+0x386/0x540 [ 2489.062370] ? init_once+0x230/0x230 [ 2489.062873] ? generic_write_checks+0x2ad/0x390 [ 2489.063505] ? down_write+0xe0/0x160 [ 2489.064011] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2489.064714] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2489.065435] file_modified+0x14/0xa0 [ 2489.065954] ext4_file_write_iter+0x906/0x18e0 [ 2489.066594] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2489.067204] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2489.067883] ? SOFTIRQ_verbose+0x10/0x10 [ 2489.068425] new_sync_write+0x42c/0x660 [ 2489.068968] ? new_sync_read+0x6f0/0x6f0 [ 2489.069527] ? ksys_write+0x12d/0x260 [ 2489.070052] ? lock_release+0x6b0/0x6b0 [ 2489.070590] ? selinux_file_permission+0x36/0x510 [ 2489.071253] ? __fget_files+0x296/0x480 [ 2489.071818] vfs_write+0x747/0xa30 [ 2489.072308] ksys_write+0x12d/0x260 [ 2489.072802] ? __ia32_sys_read+0xb0/0xb0 [ 2489.073320] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2489.074038] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2489.074741] do_syscall_64+0x33/0x40 [ 2489.075239] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2489.075905] RIP: 0033:0x7ff051cc9b19 [ 2489.076402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2489.078918] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2489.079968] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2489.080972] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2489.081942] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2489.082924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2489.083885] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:30:16 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0xafa1}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:30:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) fallocate(r0, 0x28, 0xc0000000000000, 0x9e) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:30:16 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb2", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:16 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 11) 09:30:16 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:16 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 2489.484889] FAULT_INJECTION: forcing a failure. [ 2489.484889] name failslab, interval 1, probability 0, space 0, times 0 [ 2489.486553] CPU: 1 PID: 17303 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2489.487598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2489.488757] Call Trace: [ 2489.489132] dump_stack+0x107/0x167 [ 2489.489671] should_fail.cold+0x5/0xa [ 2489.490196] ? jbd2__journal_start+0x190/0x890 [ 2489.490834] should_failslab+0x5/0x20 [ 2489.491363] kmem_cache_alloc+0x5b/0x360 [ 2489.491959] jbd2__journal_start+0x190/0x890 [ 2489.492563] __ext4_journal_start_sb+0x214/0x430 [ 2489.493294] ext4_dirty_inode+0xbc/0x130 [ 2489.494058] ? ext4_setattr+0x22c0/0x22c0 [ 2489.494645] __mark_inode_dirty+0x492/0xf10 [ 2489.495245] generic_update_time+0x21c/0x370 [ 2489.495868] file_update_time+0x43a/0x520 [ 2489.496454] ? evict_inodes+0x420/0x420 [ 2489.497024] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2489.497710] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2489.498426] file_modified+0x7d/0xa0 [ 2489.498976] ext4_file_write_iter+0x906/0x18e0 [ 2489.499670] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2489.500293] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2489.501000] ? SOFTIRQ_verbose+0x10/0x10 [ 2489.501554] new_sync_write+0x42c/0x660 [ 2489.502098] ? new_sync_read+0x6f0/0x6f0 [ 2489.502746] ? ksys_write+0x12d/0x260 [ 2489.503358] ? lock_release+0x6b0/0x6b0 [ 2489.503903] ? selinux_file_permission+0x36/0x510 [ 2489.504558] ? __fget_files+0x296/0x480 [ 2489.505154] vfs_write+0x747/0xa30 [ 2489.505662] ksys_write+0x12d/0x260 [ 2489.506177] ? __ia32_sys_read+0xb0/0xb0 [ 2489.506749] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2489.507467] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2489.508181] do_syscall_64+0x33/0x40 [ 2489.508719] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2489.509422] RIP: 0033:0x7ff051cc9b19 [ 2489.509944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2489.512464] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2489.513520] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2489.514480] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2489.515471] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2489.516466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2489.517512] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 [ 2503.070302] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:30:38 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="100000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:30:38 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:30:38 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb2", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:38 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x80) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:30:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:30:38 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 12) 09:30:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="c00000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:30:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x20, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) [ 2511.301072] FAULT_INJECTION: forcing a failure. [ 2511.301072] name failslab, interval 1, probability 0, space 0, times 0 [ 2511.302961] CPU: 0 PID: 17334 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2511.303959] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2511.305179] Call Trace: [ 2511.305568] dump_stack+0x107/0x167 [ 2511.306124] should_fail.cold+0x5/0xa [ 2511.306676] ? create_object.isra.0+0x3a/0xa20 [ 2511.307332] should_failslab+0x5/0x20 [ 2511.307862] kmem_cache_alloc+0x5b/0x360 [ 2511.308447] create_object.isra.0+0x3a/0xa20 [ 2511.309093] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2511.309818] kmem_cache_alloc+0x159/0x360 [ 2511.310415] jbd2__journal_start+0x190/0x890 [ 2511.311080] __ext4_journal_start_sb+0x214/0x430 [ 2511.311753] ext4_dirty_inode+0xbc/0x130 [ 2511.312372] ? ext4_setattr+0x22c0/0x22c0 [ 2511.312964] __mark_inode_dirty+0x492/0xf10 [ 2511.313614] generic_update_time+0x21c/0x370 [ 2511.314239] file_update_time+0x43a/0x520 [ 2511.314820] ? evict_inodes+0x420/0x420 09:30:38 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb2", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2511.315369] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2511.316260] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2511.317025] file_modified+0x7d/0xa0 [ 2511.317560] ext4_file_write_iter+0x906/0x18e0 [ 2511.318241] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2511.318911] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2511.319616] ? SOFTIRQ_verbose+0x10/0x10 [ 2511.320197] new_sync_write+0x42c/0x660 [ 2511.320812] ? new_sync_read+0x6f0/0x6f0 [ 2511.321392] ? ksys_write+0x12d/0x260 [ 2511.321965] ? lock_release+0x6b0/0x6b0 [ 2511.322538] ? selinux_file_permission+0x36/0x510 [ 2511.323241] ? __fget_files+0x296/0x480 [ 2511.323802] vfs_write+0x747/0xa30 [ 2511.324377] ksys_write+0x12d/0x260 [ 2511.324932] ? __ia32_sys_read+0xb0/0xb0 [ 2511.325521] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2511.326295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2511.327018] do_syscall_64+0x33/0x40 [ 2511.327566] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2511.328304] RIP: 0033:0x7ff051cc9b19 [ 2511.328823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2511.331493] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2511.332539] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2511.333608] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2511.334603] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2511.335602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2511.336613] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:30:38 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0xe, 0x0, 0x4) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) r1 = signalfd(r0, &(0x7f0000000000)={[0x6]}, 0x8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r4, 0x0, r4) read(r4, &(0x7f0000000300)=""/4, 0x4) dup2(r3, r4) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x8001, {{0x2, 0x4e24, @empty}}}, 0x88) 09:30:38 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:38 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:30:38 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 2525.592795] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:31:00 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x8000, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, 0x0, 0xfdef) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x2) 09:31:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="c00e00001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:31:00 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) r2 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x40) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000005, 0x110, r0, 0x7fffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x1000000, [{0xe5d, 0x9}]}, 0xc, 0x1) r3 = syz_io_uring_complete(0x0) openat(r3, &(0x7f0000000100)='./file0\x00', 0x0, 0x46) write$binfmt_elf64(r0, 0x0, 0xfdef) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0xa}}, './file0\x00'}) sendmsg$NL80211_CMD_GET_COALESCE(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6d794b5a5ce4a2a4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x0, 0x300, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x23}, @void, @val={0xc, 0x99, {0x0, 0x26}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 09:31:00 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:31:00 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:00 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:00 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 13) [ 2533.751261] FAULT_INJECTION: forcing a failure. [ 2533.751261] name failslab, interval 1, probability 0, space 0, times 0 [ 2533.753522] CPU: 1 PID: 17580 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2533.754476] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2533.755599] Call Trace: [ 2533.755967] dump_stack+0x107/0x167 [ 2533.756457] should_fail.cold+0x5/0xa [ 2533.757003] ? create_object.isra.0+0x3a/0xa20 [ 2533.757663] should_failslab+0x5/0x20 [ 2533.758192] kmem_cache_alloc+0x5b/0x360 [ 2533.758765] create_object.isra.0+0x3a/0xa20 [ 2533.759364] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2533.760068] kmem_cache_alloc+0x159/0x360 [ 2533.760651] jbd2__journal_start+0x190/0x890 [ 2533.761236] __ext4_journal_start_sb+0x214/0x430 [ 2533.761925] ext4_dirty_inode+0xbc/0x130 [ 2533.762494] ? ext4_setattr+0x22c0/0x22c0 [ 2533.763056] __mark_inode_dirty+0x492/0xf10 [ 2533.763664] generic_update_time+0x21c/0x370 [ 2533.764277] file_update_time+0x43a/0x520 [ 2533.764855] ? evict_inodes+0x420/0x420 [ 2533.765447] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2533.766136] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2533.766875] file_modified+0x7d/0xa0 [ 2533.767380] ext4_file_write_iter+0x906/0x18e0 [ 2533.768013] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2533.768638] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2533.769374] ? SOFTIRQ_verbose+0x10/0x10 [ 2533.769921] new_sync_write+0x42c/0x660 [ 2533.770457] ? new_sync_read+0x6f0/0x6f0 [ 2533.771014] ? ksys_write+0x12d/0x260 [ 2533.771538] ? lock_release+0x6b0/0x6b0 [ 2533.772084] ? selinux_file_permission+0x36/0x510 [ 2533.772734] ? __fget_files+0x296/0x480 [ 2533.773632] vfs_write+0x747/0xa30 [ 2533.774189] ksys_write+0x12d/0x260 [ 2533.774669] ? __ia32_sys_read+0xb0/0xb0 [ 2533.775196] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2533.775921] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2533.776648] do_syscall_64+0x33/0x40 [ 2533.777206] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2533.777994] RIP: 0033:0x7ff051cc9b19 [ 2533.778534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2533.781139] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2533.782272] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2533.783224] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2533.784195] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2533.785215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2533.786216] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:31:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x2, 0x7, 0x801, 0x0, 0x0, {0x785d1d7393a1d86f, 0x0, 0x8}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x20008051}, 0x1) syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000b00)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x244000}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000980), r4) sendmsg$NLBL_CALIPSO_C_ADD(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000009c0)={0x14, r6, 0x1}, 0x14}}, 0x0) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_ADD(r5, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x34, r7, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x40010) syz_io_uring_submit(0x0, r2, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r3}}, 0x4) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) sendmsg$nl_generic(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x20}}, 0x0) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000000)={0x3ff, 0x7, 0x5}) 09:31:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="e03f03001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:31:00 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:00 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) recvmmsg(r2, &(0x7f0000001300)=[{{&(0x7f00000000c0)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000000240)=[{}, {&(0x7f0000000140)=""/216, 0xd8}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x3, &(0x7f00000012c0)=""/41, 0x29}, 0xff}], 0x1, 0x1, &(0x7f0000001340)) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:31:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 14) 09:31:00 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:31:00 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:00 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2534.179516] FAULT_INJECTION: forcing a failure. [ 2534.179516] name failslab, interval 1, probability 0, space 0, times 0 [ 2534.181123] CPU: 0 PID: 17710 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2534.182231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2534.183333] Call Trace: [ 2534.183709] dump_stack+0x107/0x167 [ 2534.184239] should_fail.cold+0x5/0xa [ 2534.184783] ? create_object.isra.0+0x3a/0xa20 [ 2534.185467] should_failslab+0x5/0x20 [ 2534.185976] kmem_cache_alloc+0x5b/0x360 [ 2534.186535] create_object.isra.0+0x3a/0xa20 [ 2534.187153] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2534.187834] kmem_cache_alloc+0x159/0x360 [ 2534.188405] jbd2__journal_start+0x190/0x890 [ 2534.189016] __ext4_journal_start_sb+0x214/0x430 [ 2534.189700] ext4_file_write_iter+0xdbf/0x18e0 [ 2534.190334] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2534.190944] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2534.191637] ? SOFTIRQ_verbose+0x10/0x10 [ 2534.192192] new_sync_write+0x42c/0x660 [ 2534.192752] ? new_sync_read+0x6f0/0x6f0 [ 2534.193333] ? ksys_write+0x12d/0x260 [ 2534.193872] ? lock_release+0x6b0/0x6b0 [ 2534.194431] ? selinux_file_permission+0x36/0x510 [ 2534.195130] ? __fget_files+0x296/0x480 [ 2534.195679] vfs_write+0x747/0xa30 [ 2534.196210] ksys_write+0x12d/0x260 [ 2534.196690] ? __ia32_sys_read+0xb0/0xb0 [ 2534.197235] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2534.197970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2534.198661] do_syscall_64+0x33/0x40 [ 2534.199170] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2534.199860] RIP: 0033:0x7ff051cc9b19 [ 2534.200362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2534.202929] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2534.203960] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2534.204915] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2534.205861] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2534.206840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2534.207810] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 [ 2547.605347] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:31:22 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="a00100201e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:31:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:31:22 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/mac80211_hwsim', 0x40, 0x82) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff], 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:31:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 15) 09:31:22 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) accept4$inet(r1, 0x0, 0x0, 0x80000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(r2, 0x0, 0x2, 0x2) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r2, 0x0, 0xfdef) 09:31:22 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="00f0ff7f1e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2555.526461] FAULT_INJECTION: forcing a failure. [ 2555.526461] name failslab, interval 1, probability 0, space 0, times 0 [ 2555.528060] CPU: 1 PID: 17837 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2555.528971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2555.530148] Call Trace: [ 2555.530507] dump_stack+0x107/0x167 [ 2555.530985] should_fail.cold+0x5/0xa [ 2555.531488] ? __iomap_dio_rw+0x1ee/0x11a0 [ 2555.532049] should_failslab+0x5/0x20 [ 2555.532550] kmem_cache_alloc_trace+0x55/0x360 [ 2555.533177] __iomap_dio_rw+0x1ee/0x11a0 [ 2555.533756] ? jbd2_journal_stop+0x188/0xe70 [ 2555.534348] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2555.534915] ? ext4_orphan_add+0x253/0x9e0 [ 2555.535460] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2555.536086] ? ext4_empty_dir+0xae0/0xae0 [ 2555.536619] ? jbd2__journal_start+0xf3/0x890 [ 2555.537209] iomap_dio_rw+0x31/0x90 [ 2555.537729] ext4_file_write_iter+0xb26/0x18e0 [ 2555.538366] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2555.538966] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2555.539678] ? SOFTIRQ_verbose+0x10/0x10 [ 2555.540372] new_sync_write+0x42c/0x660 [ 2555.541001] ? new_sync_read+0x6f0/0x6f0 [ 2555.541588] ? ksys_write+0x12d/0x260 [ 2555.542142] ? lock_release+0x6b0/0x6b0 [ 2555.542696] ? selinux_file_permission+0x36/0x510 [ 2555.543345] ? __fget_files+0x296/0x480 [ 2555.543901] vfs_write+0x747/0xa30 [ 2555.544395] ksys_write+0x12d/0x260 [ 2555.544895] ? __ia32_sys_read+0xb0/0xb0 [ 2555.545491] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2555.546255] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2555.546934] do_syscall_64+0x33/0x40 [ 2555.547446] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2555.548143] RIP: 0033:0x7ff051cc9b19 [ 2555.548671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2555.555153] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2555.556062] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2555.557007] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2555.557956] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2555.558824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2555.559755] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:31:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext={0xfcf8, 0x7}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = getpid() r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgid(0x0) r4 = epoll_create(0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r3, 0x7, r4, &(0x7f0000000040)={r4, r5}) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/packet\x00') r7 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xd4, 0x0, 0x4, 0x83, 0x0, 0xfffffffffffff000, 0x20240, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xb49, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x2008, 0x91ab, 0x80000001, 0x0, 0xfffffffffffffff7, 0xb3a0, 0x800, 0x0, 0xda47, 0x0, 0x6b}, r3, 0x8, r6, 0x1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000002c0)=0x0) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000300)=0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={r2, 0x9b20, 0x7, 0x7}) ioctl$sock_netdev_private(r10, 0x89f6, &(0x7f0000000540)="a6406175578d843be13bf4ea25b274ddd88c7d7eef728eb531e432ced0ef2bcb58fc72e5f86eaff0c64794f101d32201b8d09a535b911c961dbf7f51fc4d9c83ebef1bef40f50ec4f12f5be3b3512910f0a9e5b6a062ff915b13c01a5126d0f4c55fc150411ba0bc65278df60a6e10442b8e0127a7b677ddda9a4b478a7f6bda6cde506116d791c11cb28cd54b89d910de8fa709204319aead1d517a26d131130df647e4611d88a6c97f6175f7e24ad9e8eb686c0bf00f7949a0c6b8e7b21e1ab9a909d3c4e4daf368616f5f9386a1b53abbc6bfe65a69abab5060c295b661d7fb2a0f34244e4d5f8e50f6601855654a0275bb528f") kcmp(r8, r9, 0x5, 0xffffffffffffffff, r5) write$binfmt_elf64(r0, 0x0, 0xfdef) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x8, 0x70bd2d, 0xb4, {{}, {}, {0x8, 0x2, 0x7}}, ["", "", "", ""]}, 0x24}}, 0x4000) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r7, 0x40049366, &(0x7f0000000080)) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000640)=ANY=[@ANYBLOB="6a0000090e8220d8187f794e4cef120f7b9a03691a319f2739408ec5dd4901d718efb5abf3835d67f5710437aa964af30993c2b76a43edfaecd135ee94f404d14dba96c184b6f7a70926f8e5cf14f1e9372f5edbb1973e94351a7c924cf763a19317edf78efa5c101efbb744e1df87bfdc1de49e370096da", @ANYRES16=0x0, @ANYBLOB="04002bbd7000fbdbdf25380000000c0058003b000000000000000c00580030000000000000000c00580033000000000000000c00580015000000000000000c00580060000000000000000c00580077030000000000007f24e994e5ab3d8e644ba0a8f3461cd32018db673368ea6fb67b466122e31a6c96e26b02f4de5164065c5bed2c70cc188b5ddf9e1bb750f949b26adabe2fbebceef61361e4e5d68f8f5bd11f774af6954935a02f"], 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x40091) 09:31:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:31:22 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 16) 09:31:22 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:22 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="effdffff1e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2555.792077] FAULT_INJECTION: forcing a failure. [ 2555.792077] name failslab, interval 1, probability 0, space 0, times 0 [ 2555.793708] CPU: 0 PID: 17853 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2555.794682] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2555.795991] Call Trace: [ 2555.796361] dump_stack+0x107/0x167 [ 2555.796858] should_fail.cold+0x5/0xa [ 2555.797377] ? create_object.isra.0+0x3a/0xa20 [ 2555.798051] should_failslab+0x5/0x20 [ 2555.798589] kmem_cache_alloc+0x5b/0x360 [ 2555.799158] create_object.isra.0+0x3a/0xa20 [ 2555.799789] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2555.800467] kmem_cache_alloc+0x159/0x360 [ 2555.801042] jbd2__journal_start+0x190/0x890 [ 2555.801645] __ext4_journal_start_sb+0x214/0x430 [ 2555.802279] ext4_file_write_iter+0xdbf/0x18e0 [ 2555.802932] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2555.803588] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2555.804302] ? SOFTIRQ_verbose+0x10/0x10 [ 2555.804890] new_sync_write+0x42c/0x660 [ 2555.805436] ? new_sync_read+0x6f0/0x6f0 [ 2555.806010] ? ksys_write+0x12d/0x260 [ 2555.806519] ? lock_release+0x6b0/0x6b0 [ 2555.807064] ? selinux_file_permission+0x36/0x510 [ 2555.807720] ? __fget_files+0x296/0x480 [ 2555.808266] vfs_write+0x747/0xa30 [ 2555.808774] ksys_write+0x12d/0x260 [ 2555.809275] ? __ia32_sys_read+0xb0/0xb0 [ 2555.809838] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2555.810571] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2555.811268] do_syscall_64+0x33/0x40 [ 2555.811770] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2555.812445] RIP: 0033:0x7ff051cc9b19 [ 2555.812946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2555.815483] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2555.816541] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2555.817502] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2555.818470] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2555.819412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2555.820362] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:31:22 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) getuid() stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) setresuid(0x0, r2, r3) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000000)=@v3={0x3000000, [{}, {0x0, 0x10001}], r1}, 0x18, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) [ 2569.401080] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:31:44 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:31:44 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:44 executing program 7: socket$nl_xfrm(0x10, 0x3, 0x6) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x22, 0x80000001, 0x1) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0xfffffffd}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:31:44 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 17) 09:31:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000000f00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:31:44 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x9, 0x1, 0x4, 0x3, 0x0, 0x80000000, 0x24121, 0xae6520ca93067e3e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x40070, 0x7fff, 0x3, 0x8, 0x7, 0x9, 0x1f, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0xa, r1, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000c018}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='p\x000e', @ANYRES16=r2, @ANYBLOB="000226bd7000fddbdf251700000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900e80000007a0000000a00060008021100000100000a00060008021100000000000a001a0008021100000100000a000600ffffffffffff00000a00060008021100000000000a0006000802110000010000"], 0x70}, 0x1, 0x0, 0x0, 0x50}, 0x4c005) [ 2577.760882] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=17991 comm=syz-executor.0 [ 2577.777095] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=17991 comm=syz-executor.0 09:31:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001000213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2577.811353] FAULT_INJECTION: forcing a failure. [ 2577.811353] name failslab, interval 1, probability 0, space 0, times 0 [ 2577.812978] CPU: 0 PID: 17989 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2577.813969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2577.815094] Call Trace: [ 2577.815640] dump_stack+0x107/0x167 [ 2577.816133] should_fail.cold+0x5/0xa [ 2577.816680] ? create_object.isra.0+0x3a/0xa20 [ 2577.817297] should_failslab+0x5/0x20 [ 2577.817821] kmem_cache_alloc+0x5b/0x360 [ 2577.818394] create_object.isra.0+0x3a/0xa20 [ 2577.819003] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2577.819708] kmem_cache_alloc_trace+0x151/0x360 [ 2577.820357] __iomap_dio_rw+0x1ee/0x11a0 [ 2577.820929] ? jbd2_journal_stop+0x188/0xe70 [ 2577.821554] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2577.822209] ? ext4_orphan_add+0x253/0x9e0 [ 2577.822802] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2577.823455] ? ext4_empty_dir+0xae0/0xae0 [ 2577.824001] ? jbd2__journal_start+0xf3/0x890 [ 2577.824593] iomap_dio_rw+0x31/0x90 [ 2577.825115] ext4_file_write_iter+0xb26/0x18e0 [ 2577.825742] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2577.826399] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2577.827109] ? SOFTIRQ_verbose+0x10/0x10 [ 2577.827675] new_sync_write+0x42c/0x660 [ 2577.828220] ? new_sync_read+0x6f0/0x6f0 [ 2577.828761] ? ksys_write+0x12d/0x260 [ 2577.829303] ? lock_release+0x6b0/0x6b0 [ 2577.829841] ? selinux_file_permission+0x36/0x510 [ 2577.830544] ? __fget_files+0x296/0x480 [ 2577.831109] vfs_write+0x747/0xa30 [ 2577.831577] ksys_write+0x12d/0x260 [ 2577.832045] ? __ia32_sys_read+0xb0/0xb0 [ 2577.832578] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2577.833288] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2577.834031] do_syscall_64+0x33/0x40 [ 2577.834543] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2577.835234] RIP: 0033:0x7ff051cc9b19 [ 2577.835732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2577.838173] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2577.839211] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2577.840209] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2577.841165] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2577.842119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2577.843053] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:31:44 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x2938d2adc19180ff, 0x3) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:31:44 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:31:44 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:44 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:31:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 18) 09:31:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x1, 0x0, 0x0, 0x1}, 0xc04c080) 09:31:44 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2578.265834] FAULT_INJECTION: forcing a failure. [ 2578.265834] name failslab, interval 1, probability 0, space 0, times 0 [ 2578.267560] CPU: 1 PID: 18050 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2578.268516] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2578.269692] Call Trace: [ 2578.270128] dump_stack+0x107/0x167 [ 2578.270659] should_fail.cold+0x5/0xa [ 2578.271247] ? create_object.isra.0+0x3a/0xa20 [ 2578.271918] should_failslab+0x5/0x20 [ 2578.272470] kmem_cache_alloc+0x5b/0x360 [ 2578.273054] create_object.isra.0+0x3a/0xa20 [ 2578.273700] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2578.274506] kmem_cache_alloc+0x159/0x360 [ 2578.275115] jbd2__journal_start+0x190/0x890 [ 2578.275779] __ext4_journal_start_sb+0x214/0x430 [ 2578.276491] ext4_iomap_begin+0x485/0x700 [ 2578.277148] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2578.277880] ? iomap_dio_rw+0x31/0x90 [ 2578.278419] ? vfs_write+0x747/0xa30 [ 2578.278973] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2578.279925] ? lock_chain_count+0x20/0x20 [ 2578.280531] iomap_apply+0x164/0x9e0 [ 2578.281087] ? iomap_dio_rw+0x90/0x90 [ 2578.281642] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2578.282508] ? mark_held_locks+0x9e/0xe0 [ 2578.283140] ? filemap_check_errors+0xa5/0x150 [ 2578.283824] __iomap_dio_rw+0x6cd/0x11a0 [ 2578.284400] ? iomap_dio_rw+0x90/0x90 [ 2578.284959] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2578.285624] ? ext4_orphan_add+0x253/0x9e0 [ 2578.286262] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2578.286991] ? ext4_empty_dir+0xae0/0xae0 [ 2578.287585] ? jbd2__journal_start+0xf3/0x890 [ 2578.288255] iomap_dio_rw+0x31/0x90 [ 2578.288792] ext4_file_write_iter+0xb26/0x18e0 [ 2578.289479] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2578.290138] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2578.290914] ? SOFTIRQ_verbose+0x10/0x10 [ 2578.291518] new_sync_write+0x42c/0x660 [ 2578.292073] ? new_sync_read+0x6f0/0x6f0 [ 2578.292660] ? ksys_write+0x12d/0x260 [ 2578.293223] ? lock_release+0x6b0/0x6b0 [ 2578.293771] ? selinux_file_permission+0x36/0x510 [ 2578.294514] ? __fget_files+0x296/0x480 [ 2578.295114] vfs_write+0x747/0xa30 [ 2578.295616] ksys_write+0x12d/0x260 [ 2578.296168] ? __ia32_sys_read+0xb0/0xb0 [ 2578.296777] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2578.297513] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2578.298325] do_syscall_64+0x33/0x40 [ 2578.298889] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2578.299646] RIP: 0033:0x7ff051cc9b19 [ 2578.300182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2578.302912] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2578.304068] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2578.305100] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2578.306179] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2578.307234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2578.308276] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 [ 2591.828119] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:32:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001100213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:32:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 19) 09:32:14 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:14 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:32:14 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001780)={0x28, r1, 0x1, 0x0, 0x0, {0x5}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x7}]}, 0x28}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) openat(0xffffffffffffffff, 0x0, 0x1734c0, 0x1a3) fsetxattr$security_capability(r4, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r4, 0x0, 0xfdef) 09:32:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x5, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f00000000c0)={0x5, 0x38, '\x00', 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 09:32:14 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b2", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:14 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2607.481847] FAULT_INJECTION: forcing a failure. [ 2607.481847] name failslab, interval 1, probability 0, space 0, times 0 [ 2607.483585] CPU: 1 PID: 18141 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2607.484538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2607.485691] Call Trace: [ 2607.486074] dump_stack+0x107/0x167 [ 2607.486615] should_fail.cold+0x5/0xa [ 2607.487150] ? jbd2__journal_start+0x190/0x890 [ 2607.487776] should_failslab+0x5/0x20 [ 2607.488282] kmem_cache_alloc+0x5b/0x360 [ 2607.488857] jbd2__journal_start+0x190/0x890 [ 2607.489475] __ext4_journal_start_sb+0x214/0x430 [ 2607.490098] ext4_file_write_iter+0x114b/0x18e0 [ 2607.490758] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2607.491404] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2607.492113] ? SOFTIRQ_verbose+0x10/0x10 [ 2607.492701] new_sync_write+0x42c/0x660 [ 2607.493226] ? new_sync_read+0x6f0/0x6f0 [ 2607.493771] ? ksys_write+0x12d/0x260 [ 2607.494313] ? lock_release+0x6b0/0x6b0 [ 2607.494860] ? selinux_file_permission+0x36/0x510 [ 2607.495530] ? __fget_files+0x296/0x480 [ 2607.496078] vfs_write+0x747/0xa30 [ 2607.496584] ksys_write+0x12d/0x260 [ 2607.497112] ? __ia32_sys_read+0xb0/0xb0 [ 2607.497706] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2607.498518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2607.499268] do_syscall_64+0x33/0x40 [ 2607.499809] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2607.500548] RIP: 0033:0x7ff051cc9b19 [ 2607.501094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2607.503796] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2607.504950] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2607.505981] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2607.507060] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2607.508064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2607.509063] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:32:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001200213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:32:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 20) 09:32:14 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:14 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b2", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvmmsg$unix(r0, &(0x7f0000000c80)=[{{&(0x7f00000000c0), 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/120, 0x78}, {&(0x7f00000001c0)=""/86, 0x56}, {&(0x7f0000000240)=""/57, 0x39}, {&(0x7f00000002c0)=""/228, 0xe4}], 0x4, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=""/156, 0x9c}, {&(0x7f0000000500)=""/63, 0x3f}], 0x2, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}}, {{&(0x7f0000000680), 0x6e, &(0x7f0000000980)=[{&(0x7f0000000700)=""/245, 0xf5}, {&(0x7f0000000800)=""/148, 0x94}, {&(0x7f00000008c0)=""/83, 0x53}, {&(0x7f0000000940)}], 0x4, &(0x7f00000009c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x118}}, {{&(0x7f0000000b00), 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000b80)=""/78, 0x4e}, {&(0x7f0000000c00)=""/20, 0x14}], 0x2}}], 0x4, 0x20, &(0x7f0000000d80)) sendmsg$nl_generic(r1, &(0x7f0000000e80)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x1c, 0x1b, 0x1, 0x70bd2c, 0x25dfdbff, {0x20}, [@typed={0x8, 0x16, 0x0, 0x0, @u32=0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x1) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2) 09:32:14 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'filter\x00', 0x0, 0x0, 0x0, [0x53b0, 0x0, 0x7, 0x3, 0x4c51, 0x8000]}, &(0x7f0000000000)=0x78) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:32:14 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:32:14 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2607.884813] FAULT_INJECTION: forcing a failure. [ 2607.884813] name failslab, interval 1, probability 0, space 0, times 0 [ 2607.886454] CPU: 1 PID: 18273 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2607.887374] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2607.888471] Call Trace: [ 2607.888824] dump_stack+0x107/0x167 [ 2607.889290] should_fail.cold+0x5/0xa [ 2607.889773] ? create_object.isra.0+0x3a/0xa20 [ 2607.890409] should_failslab+0x5/0x20 [ 2607.890902] kmem_cache_alloc+0x5b/0x360 [ 2607.891466] create_object.isra.0+0x3a/0xa20 [ 2607.892048] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2607.892758] kmem_cache_alloc+0x159/0x360 [ 2607.893340] jbd2__journal_start+0x190/0x890 [ 2607.893962] __ext4_journal_start_sb+0x214/0x430 [ 2607.894630] ext4_file_write_iter+0x114b/0x18e0 [ 2607.895290] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2607.895924] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2607.896657] ? SOFTIRQ_verbose+0x10/0x10 [ 2607.897266] new_sync_write+0x42c/0x660 [ 2607.897808] ? new_sync_read+0x6f0/0x6f0 [ 2607.898391] ? ksys_write+0x12d/0x260 [ 2607.898940] ? lock_release+0x6b0/0x6b0 [ 2607.899500] ? selinux_file_permission+0x36/0x510 [ 2607.900199] ? __fget_files+0x296/0x480 [ 2607.900769] vfs_write+0x747/0xa30 [ 2607.901285] ksys_write+0x12d/0x260 [ 2607.901804] ? __ia32_sys_read+0xb0/0xb0 [ 2607.902405] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2607.903149] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2607.903893] do_syscall_64+0x33/0x40 [ 2607.904429] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2607.905153] RIP: 0033:0x7ff051cc9b19 [ 2607.905687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2607.908306] RSP: 002b:00007ff04f21e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2607.909467] RAX: ffffffffffffffda RBX: 00007ff051ddd020 RCX: 00007ff051cc9b19 [ 2607.910541] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2607.911525] RBP: 00007ff04f21e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2607.912519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2607.913493] R13: 00007ffe18e6f4cf R14: 00007ff04f21e300 R15: 0000000000022000 [ 2621.264358] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:32:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001300213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:32:36 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 21) 09:32:36 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x1f, 0xa4, &(0x7f00000000c0)="91e4e8339cff48a82e29ec3812bbcd144d9b32640de5dd4b699513dd0804897838cf60f6fc75a7df7fff0a8dbf3a9024d44a1c6ba0c22092abc05baf81848666fd08d34e9fa6a37d0b7df02f1f08b50176515962615394c9de704d1a561d56f900cd637b6ce06e92cc103cae260fd8357b9eabc03d5c56ec04d9dd7b3374a53419036b45c73e05b9fea57499b107fa086161e070ec52a0cef6d6dae9877edc04ba42b3a8"}) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:32:36 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b2", @ANYRES16, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x8}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:32:36 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x180000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x12) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) [ 2629.284744] FAULT_INJECTION: forcing a failure. [ 2629.284744] name failslab, interval 1, probability 0, space 0, times 0 [ 2629.286419] CPU: 0 PID: 18292 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2629.287541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2629.288725] Call Trace: [ 2629.289114] dump_stack+0x107/0x167 [ 2629.289632] should_fail.cold+0x5/0xa [ 2629.290169] ? jbd2__journal_start+0x190/0x890 [ 2629.290851] should_failslab+0x5/0x20 [ 2629.291372] kmem_cache_alloc+0x5b/0x360 [ 2629.291926] jbd2__journal_start+0x190/0x890 [ 2629.292527] __ext4_journal_start_sb+0x214/0x430 [ 2629.293177] ext4_truncate+0x665/0x12b0 [ 2629.293748] ? ext4_punch_hole+0x1110/0x1110 [ 2629.294409] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2629.295194] ext4_file_write_iter+0x13a5/0x18e0 [ 2629.295916] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2629.296624] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2629.297414] ? SOFTIRQ_verbose+0x10/0x10 [ 2629.298040] new_sync_write+0x42c/0x660 [ 2629.298687] ? new_sync_read+0x6f0/0x6f0 [ 2629.299304] ? ksys_write+0x12d/0x260 [ 2629.299802] ? lock_release+0x6b0/0x6b0 [ 2629.300314] ? selinux_file_permission+0x36/0x510 [ 2629.300932] ? __fget_files+0x296/0x480 [ 2629.301451] vfs_write+0x747/0xa30 [ 2629.301906] ksys_write+0x12d/0x260 [ 2629.302371] ? __ia32_sys_read+0xb0/0xb0 [ 2629.302896] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2629.303564] ? syscall_enter_from_user_mode+0x1d/0x50 09:32:36 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, 0x0, 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) [ 2629.304455] do_syscall_64+0x33/0x40 [ 2629.304937] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2629.305591] RIP: 0033:0x7ff051cc9b19 [ 2629.306057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2629.308530] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2629.309592] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2629.310542] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2629.311511] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2629.312452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2629.313376] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:32:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001400213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:32:36 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 22) 09:32:36 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:36 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x3176e2, 0x4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) openat(r2, 0x0, 0x0, 0x87) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) mknodat$loop(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:32:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:32:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x400080, 0x120) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)="fc686147ee7e647d04ec5bf066d1643beb73dd08f9", 0x15, 0x6) r1 = syz_open_dev$vcsu(&(0x7f0000000100), 0x8, 0x3c0) lseek(r1, 0x6, 0x0) [ 2629.677023] FAULT_INJECTION: forcing a failure. [ 2629.677023] name failslab, interval 1, probability 0, space 0, times 0 [ 2629.678551] CPU: 0 PID: 18418 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2629.679627] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2629.680886] Call Trace: [ 2629.681304] dump_stack+0x107/0x167 [ 2629.681829] should_fail.cold+0x5/0xa [ 2629.682308] ? jbd2__journal_start+0x190/0x890 [ 2629.682944] should_failslab+0x5/0x20 [ 2629.683367] kmem_cache_alloc+0x5b/0x360 [ 2629.683829] jbd2__journal_start+0x190/0x890 [ 2629.684417] __ext4_journal_start_sb+0x214/0x430 [ 2629.684941] ext4_truncate+0x665/0x12b0 [ 2629.685472] ? ext4_punch_hole+0x1110/0x1110 [ 2629.686054] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2629.686743] ext4_file_write_iter+0x13a5/0x18e0 [ 2629.687369] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2629.687980] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2629.688571] ? SOFTIRQ_verbose+0x10/0x10 [ 2629.689147] new_sync_write+0x42c/0x660 [ 2629.689674] ? new_sync_read+0x6f0/0x6f0 [ 2629.690208] ? ksys_write+0x12d/0x260 [ 2629.690732] ? lock_release+0x6b0/0x6b0 [ 2629.691220] ? selinux_file_permission+0x36/0x510 [ 2629.691823] ? __fget_files+0x296/0x480 [ 2629.692382] vfs_write+0x747/0xa30 [ 2629.692886] ksys_write+0x12d/0x260 [ 2629.693392] ? __ia32_sys_read+0xb0/0xb0 [ 2629.693965] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2629.694682] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2629.695323] do_syscall_64+0x33/0x40 [ 2629.695787] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2629.696470] RIP: 0033:0x7ff051cc9b19 [ 2629.697032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2629.699761] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2629.700711] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2629.701601] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2629.702645] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2629.703636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2629.704549] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:32:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001500213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2642.880914] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:32:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001600213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:32:58 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, 0x0, 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:58 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:32:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 23) 09:32:58 executing program 7: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000014c0)={0x24, r3, 0x1, 0x0, 0x0, {0x8}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_EEE_MODES_OURS={0x4}]}, 0x24}}, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@private=0xa010101, @in6=@mcast1, 0x4e22, 0xfffd, 0x4e23, 0x4, 0x2, 0x30, 0x20, 0x6c, r5, 0xffffffffffffffff}, {0x6, 0xb6, 0x1ff, 0x5, 0x6, 0x4, 0x9, 0xff}, {0x5, 0x52, 0x9, 0x5}, 0x7db3, 0x6e6bb9, 0x0, 0x1, 0x3, 0x2}, {{@in=@broadcast, 0x4d6, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x1b}, 0x3507, 0x1, 0x0, 0x8, 0x7, 0x2, 0xfff}}, 0xe8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, 0x0, 0xfdef) 09:32:58 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:58 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) read(r3, &(0x7f0000000300)=""/4, 0x4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u}], [{@obj_role={'obj_role', 0x3d, '['}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:32:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001800213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2651.375267] FAULT_INJECTION: forcing a failure. [ 2651.375267] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2651.378546] CPU: 0 PID: 18551 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2651.380097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2651.381969] Call Trace: [ 2651.382578] dump_stack+0x107/0x167 [ 2651.383435] should_fail.cold+0x5/0xa [ 2651.384303] __alloc_pages_nodemask+0x182/0x680 [ 2651.385353] ? xas_start+0x156/0x530 [ 2651.386211] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2651.387590] ? xas_load+0x66/0x2c0 [ 2651.388413] ? find_get_entry+0x2d9/0x6e0 [ 2651.389375] alloc_pages_current+0x187/0x280 [ 2651.390375] __page_cache_alloc+0x2d2/0x360 [ 2651.391363] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2651.392469] pagecache_get_page+0x2c7/0xc80 [ 2651.393413] ? jbd2__journal_start+0xf3/0x890 [ 2651.394424] __ext4_block_zero_page_range+0x97/0x940 [ 2651.395582] ? __ext4_journal_start_sb+0x214/0x430 [ 2651.396701] ext4_truncate+0x1007/0x12b0 [ 2651.397626] ? ext4_punch_hole+0x1110/0x1110 [ 2651.398617] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2651.399757] ext4_file_write_iter+0x13a5/0x18e0 [ 2651.400821] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2651.401159] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=17566 comm=kworker/1:2 [ 2651.401840] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2651.405673] ? SOFTIRQ_verbose+0x10/0x10 [ 2651.406599] new_sync_write+0x42c/0x660 [ 2651.407513] ? new_sync_read+0x6f0/0x6f0 [ 2651.408435] ? ksys_write+0x12d/0x260 [ 2651.409300] ? lock_release+0x6b0/0x6b0 [ 2651.410198] ? selinux_file_permission+0x36/0x510 [ 2651.411308] ? __fget_files+0x296/0x480 [ 2651.412227] vfs_write+0x747/0xa30 [ 2651.413057] ksys_write+0x12d/0x260 [ 2651.413906] ? __ia32_sys_read+0xb0/0xb0 [ 2651.414882] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2651.416094] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2651.417304] do_syscall_64+0x33/0x40 [ 2651.418175] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2651.419385] RIP: 0033:0x7ff051cc9b19 [ 2651.420259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.424522] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2651.426280] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2651.427955] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2651.429610] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2651.431271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2651.432928] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 [ 2651.543728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=17566 comm=kworker/1:2 09:32:58 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="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"], 0x398}}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:58 executing program 7: keyctl$set_timeout(0xf, 0x0, 0x18000) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x2) fsetxattr$security_capability(r1, &(0x7f0000000000), &(0x7f0000000080)=@v1={0x1000000, [{0x14000000, 0x2}]}, 0xc, 0x1) write$binfmt_elf64(r0, 0x0, 0xfdef) 09:32:58 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, 0x0, 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 24) 09:32:58 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:58 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7}, 0x1000, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) 09:32:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001900213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) [ 2651.871446] FAULT_INJECTION: forcing a failure. [ 2651.871446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2651.874134] CPU: 1 PID: 18678 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2651.875665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2651.877507] Call Trace: [ 2651.878111] dump_stack+0x107/0x167 [ 2651.878954] should_fail.cold+0x5/0xa [ 2651.879831] __alloc_pages_nodemask+0x182/0x680 [ 2651.880891] ? xas_start+0x156/0x530 [ 2651.881743] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2651.883103] ? xas_load+0x66/0x2c0 [ 2651.883915] ? find_get_entry+0x2d9/0x6e0 [ 2651.884873] alloc_pages_current+0x187/0x280 [ 2651.885866] __page_cache_alloc+0x2d2/0x360 [ 2651.886837] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2651.887927] pagecache_get_page+0x2c7/0xc80 [ 2651.888908] ? jbd2__journal_start+0xf3/0x890 [ 2651.889924] __ext4_block_zero_page_range+0x97/0x940 [ 2651.891073] ? __ext4_journal_start_sb+0x214/0x430 [ 2651.892198] ext4_truncate+0x1007/0x12b0 [ 2651.893281] ? ext4_punch_hole+0x1110/0x1110 [ 2651.894251] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2651.895602] ext4_file_write_iter+0x13a5/0x18e0 [ 2651.896673] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2651.897879] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2651.899071] ? SOFTIRQ_verbose+0x10/0x10 [ 2651.900152] new_sync_write+0x42c/0x660 [ 2651.901200] ? new_sync_read+0x6f0/0x6f0 [ 2651.902105] ? ksys_write+0x12d/0x260 [ 2651.903134] ? lock_release+0x6b0/0x6b0 [ 2651.904028] ? selinux_file_permission+0x36/0x510 [ 2651.905299] ? __fget_files+0x296/0x480 [ 2651.906217] vfs_write+0x747/0xa30 [ 2651.907172] ksys_write+0x12d/0x260 [ 2651.907991] ? __ia32_sys_read+0xb0/0xb0 [ 2651.908909] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2651.910075] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2651.911441] do_syscall_64+0x33/0x40 [ 2651.912267] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2651.913609] RIP: 0033:0x7ff051cc9b19 [ 2651.914456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.918612] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2651.920402] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2651.922047] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2651.923703] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2651.925322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2651.926928] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 09:32:58 executing program 7: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'ip6gre0\x00'}) openat(0xffffffffffffffff, 0x0, 0x400840, 0x2) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) write$binfmt_elf64(r1, 0x0, 0xfdef) 09:32:58 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:32:58 executing program 6: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53d01c49968ab8346506aeb26f7c63463c3187e7b253", @ANYRES16, @ANYBLOB="000228bd7000fcdbdf2503000000540101801c00028008000300f7ffffff08000200090000000800040006000000380004001400010002004e22e00000010000000000000000200002000a004e22fffffffa00000000000000000000fffffffffffffcffffff440002800800010016000000080001002000000008000100010000000800030001000000080002000000000508000300fbffffff0800040002000000080001001f0000000d0001007564703a73797a3200000000160001006574683a76657468305f746f5f626f6e6400000008000300010000002c0004001400010002004e226401010200000000000000001400020002004e2164010100000000000000000044000400200001000a004e2100000009fe8000000000000000000000000000bb09000000200002000a004e20000000ff20010000000000000000000000000001d8fb000008000300ffffff7f0d0001007564703a73797a310000000044000280080001000900000008000100030000000400040008000200010000001c0003800800010004000000080002000600000008000100080000000800020007000000400002800400040008000200020000000800020040000000040004002400038008000100000000000800010006000000080002000000000008000200050000001c00058008000100657468000c000280080004000600000004000280bc0005802c0002800800030009000000080001001c0000000800040002000000080003000600000008000100200000000800010075647000340002800800030004000000080001000e00000008000200ff0f0000080001000c000000080001000a000000080002000200000008000100657468000c000280080001001b0000000c00028008000200e00600002400028008000400000000000800020002000000080002001d05000008000200080000000c00028008000400363e00004400038008000200030000000800030007000000080003000000008008000300030000000800010000000100080003002000000008000100ff03000008000100010000009000048034000780080003007f00000008000300060000000800030001000100080001001d000000080001000300000008000300d20b000014000780080002000000001c08000300800000004400078008000400ffffffff08000300000000000800020007000000080001000800000008000300ff0f000008000400300c000008000100200000000800020003000000"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001a00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 09:32:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 25) 09:32:59 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x5) ftruncate(r1, 0x1000003) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="98030000ebd95f42fdaa85ac090000e2ffffffff7a53", @ANYRES16=r3, @ANYBLOB="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"], 0x398}, 0x1, 0x0, 0x0, 0x4}, 0xc0d0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3}) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 09:32:59 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() r1 = getpid() r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x6, 0x0, 0x9, 0x6, 0x0, 0x3ff, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x8}, 0x0, 0x10000, 0x71eb, 0x9, 0x1bd, 0x3, 0x800, 0x0, 0x14d9}, 0x0, 0x4, r0, 0x2) syz_open_procfs(r2, &(0x7f0000000000)='status\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 2652.329006] FAULT_INJECTION: forcing a failure. [ 2652.329006] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.331952] CPU: 0 PID: 18795 Comm: syz-executor.3 Not tainted 5.10.151 #1 [ 2652.333453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2652.335259] Call Trace: [ 2652.335845] dump_stack+0x107/0x167 [ 2652.336642] should_fail.cold+0x5/0xa [ 2652.337469] ? create_object.isra.0+0x3a/0xa20 [ 2652.338461] should_failslab+0x5/0x20 [ 2652.339325] kmem_cache_alloc+0x5b/0x360 [ 2652.340218] create_object.isra.0+0x3a/0xa20 [ 2652.341172] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2652.342286] kmem_cache_alloc+0x159/0x360 [ 2652.343197] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2652.344347] xas_alloc+0x336/0x440 [ 2652.345127] xas_create+0x35f/0x1040 [ 2652.345971] xas_store+0x90/0x1c40 [ 2652.346749] ? xas_find_conflict+0x4a6/0x9f0 [ 2652.347749] __add_to_page_cache_locked+0x708/0xcf0 [ 2652.348846] ? find_get_pages_contig+0x940/0x940 [ 2652.349883] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 2652.350993] ? find_get_entry+0x2d9/0x6e0 [ 2652.351907] add_to_page_cache_lru+0xe6/0x2e0 [ 2652.352887] ? add_to_page_cache_locked+0x40/0x40 [ 2652.353943] ? __page_cache_alloc+0x10d/0x360 [ 2652.354930] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2652.355987] pagecache_get_page+0x38b/0xc80 [ 2652.356929] ? jbd2__journal_start+0xf3/0x890 [ 2652.357913] __ext4_block_zero_page_range+0x97/0x940 [ 2652.359027] ? __ext4_journal_start_sb+0x214/0x430 [ 2652.360099] ext4_truncate+0x1007/0x12b0 [ 2652.360993] ? ext4_punch_hole+0x1110/0x1110 [ 2652.361947] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2652.363068] ext4_file_write_iter+0x13a5/0x18e0 [ 2652.364106] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2652.365105] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2652.366243] ? SOFTIRQ_verbose+0x10/0x10 [ 2652.367148] new_sync_write+0x42c/0x660 [ 2652.368021] ? new_sync_read+0x6f0/0x6f0 [ 2652.368908] ? ksys_write+0x12d/0x260 [ 2652.369746] ? lock_release+0x6b0/0x6b0 [ 2652.370617] ? selinux_file_permission+0x36/0x510 [ 2652.371686] ? __fget_files+0x296/0x480 [ 2652.372573] vfs_write+0x747/0xa30 [ 2652.373355] ksys_write+0x12d/0x260 [ 2652.374152] ? __ia32_sys_read+0xb0/0xb0 [ 2652.375050] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2652.376194] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2652.377321] do_syscall_64+0x33/0x40 [ 2652.378134] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2652.379253] RIP: 0033:0x7ff051cc9b19 [ 2652.380064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2652.384054] RSP: 002b:00007ff04f23f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2652.385709] RAX: ffffffffffffffda RBX: 00007ff051ddcf60 RCX: 00007ff051cc9b19 [ 2652.387274] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2652.388830] RBP: 00007ff04f23f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2652.390390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2652.391949] R13: 00007ffe18e6f4cf R14: 00007ff04f23f300 R15: 0000000000022000 VM DIAGNOSIS: 09:38:03 Registers: info registers vcpu 0 RAX=ffffffff83e1c5a0 RBX=ffffffff84e322c0 RCX=ffffffff83e042ec RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1c963 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670988 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1c5ae RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055593fe84678 CR3=0000000008d8e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000416ed9eb00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e1c5a0 RBX=ffff88800852b300 RCX=ffffffff83e042ec RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1c963 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670988 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1c5ae RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f33c4103010 CR3=0000000008d8e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000006000000040000000000000000 XMM02=006e65672063657865080a0100010101 XMM03=636578650e007a7a7566206365786509 XMM04=636578650d006574616469646e616320 XMM05=20636578650a00657a696d696e696d20 XMM06=746e696820636578650a006873616d73 XMM07=6511006c61746f7420636578650a0073 XMM08=007a7a7566206365786509006e656720 XMM09=006574616469646e616320636578650e XMM10=0a00657a696d696e696d20636578650d XMM11=636578650a006873616d732063657865 XMM12=746f7420636578650a0073746e696820 XMM13=73657220726f74756365786511006c61 XMM14=6169727420636578650b007374726174 XMM15=0000736465657320636578650a006567